Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)
Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)A . StableB . BandwidthC . DelayD . JitterE . SecurityView AnswerAnswer: BCD
Regarding the purpose of managing security optimization, which of the following is the most appropriate?
Regarding the purpose of managing security optimization, which of the following is the most appropriate?A . Ensure that sensitive management information is not stolen illegallyB . Prevent/reduce external network attacks and harmC . Ensure the access security of key businessD . Realize user's secure access controlView AnswerAnswer: A
IS-IS routers with an interface priority of 0 cannot participate in the DIS election.
IS-IS routers with an interface priority of 0 cannot participate in the DIS election.A . TrueB . FalseView AnswerAnswer: B
Which of the following reasons can cause the BGP neighbor relationship to fail to be established?
Which of the following reasons can cause the BGP neighbor relationship to fail to be established?A . An ACL that blocks all TCP connections is configured between the two BGP neighbor relationshipsB . IBGP neighbors are not directly connected physically.C . bgp synchronization is enabled in the fully interconnected IBGP...
On non-broadcast networks, OSPF has two modes of operation, non-broadcast multiple access and point-to-multipoint. Non-broadcast multiple access requires DR/BDR election.
On non-broadcast networks, OSPF has two modes of operation, non-broadcast multiple access and point-to-multipoint. Non-broadcast multiple access requires DR/BDR election.A . TrueB . FalseView AnswerAnswer: A
The master-slave relationship of OSPF neighbors is negotiated through DD packets.
The master-slave relationship of OSPF neighbors is negotiated through DD packets.A . TrueB . FalseView AnswerAnswer: A
If the network transformation in the project will affect the business running on the existing network, then the implementer needs to formulate strict implementation process specifications and risk avoidance measures. We generally define this type of project as a cutover project.
If the network transformation in the project will affect the business running on the existing network, then the implementer needs to formulate strict implementation process specifications and risk avoidance measures. We generally define this type of project as a cutover project.A . TrueB . FalseView AnswerAnswer: A
Regarding the cause of the dual-master failure of the VRRP backup group, which of the following is the most unlikely
Regarding the cause of the dual-master failure of the VRRP backup group, which of the following is the most unlikelyA . The VRRP backup group configurations on both ends are inconsistentB . The link that transmits the VRRP notification message is faultyC . The low-priority VRRP backup group discards the...
After replacing the twisted pair, the user finds that he cannot access the network. In this case, which troubleshooting method is most appropriate?
After replacing the twisted pair, the user finds that he cannot access the network. In this case, which troubleshooting method is most appropriate?A . Comparative configuration methodB . Top-down methodC . Bottom-up approachD . Replacement methodView AnswerAnswer: D
For the purpose of optimizing access security, which of the following is the most appropriate ?
For the purpose of optimizing access security, which of the following is the most appropriate ?A . Ensure that sensitive management information is not stolen illegallyB . Prevent and reduce external network attacks and harmC . Ensure the access security of key businessD . Realize user's secure access controlView AnswerAnswer:...