Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)

Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)A . StableB . BandwidthC . DelayD . JitterE . SecurityView AnswerAnswer: BCD

November 17, 2021 No Comments READ MORE +

Regarding the purpose of managing security optimization, which of the following is the most appropriate?

Regarding the purpose of managing security optimization, which of the following is the most appropriate?A . Ensure that sensitive management information is not stolen illegallyB . Prevent/reduce external network attacks and harmC . Ensure the access security of key businessD . Realize user's secure access controlView AnswerAnswer: A

November 17, 2021 No Comments READ MORE +

IS-IS routers with an interface priority of 0 cannot participate in the DIS election.

IS-IS routers with an interface priority of 0 cannot participate in the DIS election.A . TrueB . FalseView AnswerAnswer: B

November 17, 2021 No Comments READ MORE +

Which of the following reasons can cause the BGP neighbor relationship to fail to be established?

Which of the following reasons can cause the BGP neighbor relationship to fail to be established?A . An ACL that blocks all TCP connections is configured between the two BGP neighbor relationshipsB . IBGP neighbors are not directly connected physically.C . bgp synchronization is enabled in the fully interconnected IBGP...

November 17, 2021 No Comments READ MORE +

On non-broadcast networks, OSPF has two modes of operation, non-broadcast multiple access and point-to-multipoint. Non-broadcast multiple access requires DR/BDR election.

On non-broadcast networks, OSPF has two modes of operation, non-broadcast multiple access and point-to-multipoint. Non-broadcast multiple access requires DR/BDR election.A . TrueB . FalseView AnswerAnswer: A

November 17, 2021 No Comments READ MORE +

The master-slave relationship of OSPF neighbors is negotiated through DD packets.

The master-slave relationship of OSPF neighbors is negotiated through DD packets.A . TrueB . FalseView AnswerAnswer: A

November 16, 2021 No Comments READ MORE +

If the network transformation in the project will affect the business running on the existing network, then the implementer needs to formulate strict implementation process specifications and risk avoidance measures. We generally define this type of project as a cutover project.

If the network transformation in the project will affect the business running on the existing network, then the implementer needs to formulate strict implementation process specifications and risk avoidance measures. We generally define this type of project as a cutover project.A . TrueB . FalseView AnswerAnswer: A

November 16, 2021 No Comments READ MORE +

Regarding the cause of the dual-master failure of the VRRP backup group, which of the following is the most unlikely

Regarding the cause of the dual-master failure of the VRRP backup group, which of the following is the most unlikelyA . The VRRP backup group configurations on both ends are inconsistentB . The link that transmits the VRRP notification message is faultyC . The low-priority VRRP backup group discards the...

November 16, 2021 No Comments READ MORE +

After replacing the twisted pair, the user finds that he cannot access the network. In this case, which troubleshooting method is most appropriate?

After replacing the twisted pair, the user finds that he cannot access the network. In this case, which troubleshooting method is most appropriate?A . Comparative configuration methodB . Top-down methodC . Bottom-up approachD . Replacement methodView AnswerAnswer: D

November 16, 2021 No Comments READ MORE +

For the purpose of optimizing access security, which of the following is the most appropriate ?

For the purpose of optimizing access security, which of the following is the most appropriate ?A . Ensure that sensitive management information is not stolen illegallyB . Prevent and reduce external network attacks and harmC . Ensure the access security of key businessD . Realize user's secure access controlView AnswerAnswer:...

November 16, 2021 No Comments READ MORE +