When the BFD detection intervals on both ends are 30ms and 40ms, are the following options described correctly? An A. BFD session can be established, which takes 40ms after negotiation
A B. BFD session can be established, which takes 30ms after negotiation
C. BFD sessions can be established, each occurring at its own interval
l D. BFD sessions cannot be established
An advanced access control list is a sequence of rules consisting of permit |deny statements that can match IP messages based on which attributes ?(). Multiple select).
Link state information is isolated by default between different IS-IS processes on the same router.
To achieve an on-machine migration in the BGP EVPN distributed gateway scenario, which of the following messages is required?
The RSTP protocol provides a variety of protection functions, such as when the edge port is configured as a protection state, the edge port receives the BPDU packet processing method;
The correct statement about the difference between OSPFv2 and OSPFv3 is ? Multi-select
During isis ' broadcast network database synchronization, is the following statement correct?
In an MPLS VPN network, different CE devices exchange routing information with the same PE device using different routing protocols, and different CE devices use routing protocols that are independent of each other
There can be multiple nodes under a route -policy, different node numbers are identified by nodes, and each node can have multiple if-match and apply clauses, which of the following descriptions are wrong ?
There are two Communily filters: ip comimuniy-lite lpemit 101201 ip community fiter 2permit101 ip commmuriyfilter 2pemit21 Regarding the above ommuniyfiter, the correct description is ?( Multiple choice questions).
Router RL runs the OSPF protocol and uses the display ip routing-tabe command to view the router RL's routing table , the following information about OSPF in the routing table is described correctly as ?
LDP and IGP linkage refers to the release of IGP and TD routes to ensure that LDP and IGP linkage complete network efficiency, so that KGP and LDP maintains a consistent path, minimizing traffic loss, thereby improving the reliability of the entire network.
As shown in the figure, a company sets up an OSPF network. The links in the figure all form OSPF adjacencies, and all OSFP devices declare their own loopback addresses. One day SIR2 The two links of the S2AR1 suddenly failed, and in order to detect if the network was operating properly, the engineers performed a device status check, which is correct as described below
The Serial Number field of LS is used to detect expired and duplicate LSAs. The field is a 32bt signed integer, so the small serial number is Ox8000000
Regarding Policy Routing, the following description error is ?( Single choice questions).
BGP authentication can prevent illegal routers from establishing neighbors with BGP routers, BGP authentication can be divided into MD5 authentication and Keychain authentication, please ask which BGP messages will be carried below BGPKeychain authentication information?( Multiple select).
The following statement about OSPF route filtering is incorrect.( Single choice questions).
The router connects two EBGP neighbors through two parallel Serial cables, what do you do to achieve bidirectional negative sharing between two EBGP neighbors connected by these two parallel Serial cables? ( Single choice questions).
There are routers as follows, according to which the compromise conclusion is wrong?
There is an existing network of router RI, router R, router R3, and router R4 The 4 routers are interconnected via an LN network. All 4 routers are equipped with basic oSPF. When you execute the command "displayosp" on router R2 f peer", router R2 and router R3 are discovered The status between is "2-way". So what conclusions can you draw from this output? Multiple choice questions).
NSF (Non-StoppingForwarding) and non-stop circuits are transmitted NSR (Non-Stopping Routing) are two highly reliable solutions, and the following statement is correct
Configuration under a certain interface: isis timer hello 5 level-2, the following statement is correct?
Which of the following options enables encapsulation and unencapsulation of VXLAN messages?
Regarding the description of the hello message in the PIM-SM message, the error is ?
Two routers, connected together through the serial port, but can not ping between each other , now check the port status as follows: Can the following information determine what the cause is?
The following statements about the VRRP protocol are correct (multiple choice).
When there are multiple redundant links in an IS-IS network, multiple equivalent routes may occur. Regarding equivalent routing within an IS-IS network, which of the following descriptions is wrong?
In broadcast networks, elections to DIS begin only after a neighbor relationship has been established
Which of the following statements about RADIUS is correct?( Single choice questions).
In the IS-IS broadcast network type, when establishing an adjacency relationship, if the router interface priority is set to 0, it will not participate in the dis election
Router HW1 exists in the carrier HW's network as an MPLSLSR router. The router receives a packet carrying a label, but the label entry does not exist in its LFIB. So how does the router handle that message?
Regarding the description of the encapsulation format of the labels in MPLS, the correct one is ?
As shown in the figure, the PPP link between R1 and R2 is not in the same network segment, but the R1 and R2 direct connectors can communicate, and the Ethernet link cannot communicate under the same planning, why?
Regarding route Policy, the following description is correct as ?( Multiple selection) Multiple selection
In an HW MPLS network, what parameters are used to define a forwarding equivalent class??
Assume that BGP/MPLSIPVVPN, OSPF, LDP, and static routing protocols are already enabled on the PE router . Which of the following protocols need to enable GR on PE in order to get NSF functionality? (Multiple choice questions).
Cross-device link aggregation realizes the back-to-back transmission of data traffic and the mutual spare of the heap member switches, but due to the limited bandwidth of the heap cable between the heap devices, the forwarding efficiency can be improved in the following ways?
When the ACL in the VRP has multiple matching rules (rules), the matching order is about Which of the following statements is true?( Confirmed).
The switch can suppress traffic by suppressing traffic and extremely other failures can affect operations, which of the following traffic suppression configurations is the wrong configuration
In an MPLSVPN network, when a packet enters the Internet and is forwarded, it is encapsulated with two layers of MPLS tags, and the processing of the packet in the following options is described correctly?
To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filter
In the city, that is, mpLS BGPVPN network, when the packet enters the public network forwarding, it will be encapsulated with two layers of MPLS tags, the following description of the two layers of tags, the error is ?
A multi-protocol network, the topology is shown in the figure. Take a closer look at the topology, router R4 (in Areal) is introduced into the OSPF process via the routes learned by BGP. So what categories of LS4 will R3 advertise to zone 0?( Multiple choice questions).
Regarding route introduction, the following description is correctly ?( Multiple choice questions).
WRED is configured on the newly deployed router HW The following description of the WRED feature is correct as ?( Multiple select).
There is an existing switch running the RSTP protocol. If the network topology changes, what happens to the Layer 2 forwarding table that is automatically learned by the switch?
Regarding the characteristics of CE double attribution, the description is wrong with ?
MPLS does not enable the secondary unsubject pop-up, the penultimate hop label can be the same as
Compared to IPV4 multicast, which of the following descriptions is the characteristic of IP6 multicast?
There is an existing router running OSPF HWL, HW1 interface serial0 is published in zone 1, configure commands under the OSPF process nssa default-route-advertise, based on the previous description, infers which of the following options are correct?
As shown in the topology diagram, all interfaces of the router in the figure are enabled with the ISIS protocol, and the following statement is correct.
All interfaces of the router have OSPF enabled, the Cost value of the link is identified in the figure, and the Loopback0 socket for R2 is advertised in area 1 , then Rl reaches 10022/32 with a Cost value of ?
As shown in the figure, the neighbor relationship between R1 and R2 has just been established, and the database synchronization process between R1 and R2 is correct.
One of the things you're doing is compressing the length of ip6 addresses as much as possible . The existing IP6 address is
2013xX0C130F006009cO87641308, to be able to make this P6 address more concise, you can compress the IP6 address into which of the following?( Single choice questions).
Regarding the Stub region in the OSPF protocol , the following statement is correct.
Regarding the MPLS basic forwarding process, the following description is incorrect? Radio
If the PIM-SM protocol is running in a multicast network , you need to configure RP, and the configuration equation of RP is divided into dynamic RP and static RP. The following configuration description of the RP is correct (radio).
In RSTP , which port provides a backup path to reach the root node of the spanning tree? What state is the port in?
As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice).
Two VTEPs in an XLAN can identify a VXLAN tunnel, and this VXLAN tunnel between the VTEPs will be covered by two NDEs is common to all VNI.
View the IGMP configuration of the interface on the router RTA as follows, and the information about the operation of the RTA is incorrect
A campus deployed both IPv4 and IPv6 networks for service testing, and ran IS-S to interconnect the networks. (The S-S routing protocol has good scalability and is widely used in the live network.) Regarding IS-IS extensibility, which of the following statements is true?
When deploying BGP/MPLS IPVPN, OSPF's VPN route tag is not present
The extended properties of MP-BGP are passed only locally, only locally, and only meaningful on routers that receive MP-BGP routes and generate OSPF LSAs.
The following description of the PPPoE data frame is correct?( Multiple choice questions).
XLAN uses BGP EVPN to establish a tunnel, what type of message is used? ( Single choice questions).
The following statement about the five types of LSAs in OSPF is used to pass external routes, and the following statement about the five types of LSAs is incorrect and flooding in
After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs. Which of the following is not a configurable action?
Regarding how the device handles messages in the MPLS network model, what is the following description of the error? A. The label forwarding path LSP is determined and established by various protocols during the forwarding of messages. There is certainly no stripping of the label on the B. LSR.
Both C. LER and LSR are labeled.
D. For IP packets entering the MPLS domain, the device discards them.
Without dividing the zone, is the following description of the link state routing protocol correct?
When you deploy BGP/MPLSIPVPN, when two VPNs have a common site, the common site must not use overlapping address spaces with the other sites of the two VPNs.
Which of the following default routing delivery methods does OSPF support?( Multi-select)
When DLDP detects the presence of a one-way link in the fiber, the default actions of Huawei equipment include: the DLDP state machine migrates to the Disable state, outputs Trap information, and automatically sets the interface to a blocked state.
Which of the following parameters should be modified to re-establish the is-IS neighbor relationship?
Which of the following parameters are not required when configuring BGP Peers?
The existing router HWl running BGP is configured with both IBGP neighbors and EBGP tenants. The following descriptions about IBGP Neighbors and EBGP Neighbors are correct?
RD is used to distinguish the same IP address in different VPNs, how many bits does RD contain ? (Single choice)
There is a new HW office that needs to use their router as a DHCP server. When configuring the DHCP server to provide DHCP services to the current office, what of the following items need to be configured?
You expect to deploy multicast video applications on your private, on-premises network. To achieve this, you need to have a private multicast IP address in your network . So which range of IP addresses can be used?( Single choice questions).
An engineer uses 2 routers to test Pv6 services and runs OSPFV3 to achieve interconnection and interoperability of IPV6 networks The RI has access to the loopback address of R2 The engineer looks at ri's OSPF3 routing table entry and finds that there is no route reaching the R2 loopback address It can't be caused by which of the following?
Network managers can use CAR technology in traffic policing. What of the following technologies can be applied in CAR?
As shown in the figure, there are two IP6 networks that can access the IPv4 network, and the IPsec tunnel needs to be established between the two IPv6 networks to communicate, which of the following requirements?(). Single choice questions).
The following statement about the BFD one-arm echo function is correct (multiple choice).
Between two directly attached devices that have established an IBGP neighbor, execute the shutdown command to close the interface of one of the devices. The BGP connection is not immediately disconnected.
In which of the following cases, RSTP refreshes the MAC address table?( Multi-select)
The HTTP protocol is based on TCP, so http Flood attacks can be defended against HTTP Flood attacks using the TCP Flood attack prevention method.
IPV6 multicast introduces the concept of multicast scope, which of the following ways is the multicast scope concept implemented? Multi-select
If an administrator wants to manage certain routes on the router during operations, the following tools are listed below. These routes can be flagged so that administrators can configure policies
What are the problems with manually creating static VXLAN tunnels in campus networks? Multi-select
The OSPF3 protocol is a separately developed protocol that differs somewhat from OSPF2 in that OSPFv3 is link-based rather than network segmented, and the following statement is incorrect?(). Single choice questions).
In an IPv6 network, two nodes A and B are neighbors to each other if Node A sends NS messages to Node B if node B is B After receiving the message, reply to the NA message, then view it on node A, what will the neighbor status be marked? (Single Choice Questions).
A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1. 1. 10, so what is the virtual MAC address?
Huawei's two switch SWA, SWB is connected together through 7 Ethernets, and static route aggregation is configured, and the corresponding ports on the switch SWA are E1/0/1, E1/02, E1/0/3, E1/0/4, E1/ 0/5, E1/0/6, E1/0/7, configured sequentially as if switch SWA, SWB Each aggregation group supports only 6 ports.
By default, which of the following security MAC address types lose table entries after the device restarts?
Run the SSM across the entire HW IP multicast network. The following about SSM understands correctly?( Multiple choice question)
If the Interface Sticky MAC function is enabled, what is the number of MAC addresses that the interface learns by default?
In OSPFv3, Router-LSA is generated by each router, which describes the interface address and cost of the router's links, as well as the RouteriD of the neighbor router.
The advantages of building a campus network using stacking, clustering technology include which of the following?( Multi-select)
In order to reduce the number of OSPF routes in some unscheduled areas, the OSPF protocol has developed special area functions, and the following characteristic description of ospf special areas is correct?( Single choice questions).
The following about BGP routing, describing the error, is ?
A, non-aggregate routes take precedence over aggregate routes
B. In PrefVal, Local_ Preference is equal to the case if the route is generated locally, IBGP Routing, the BGP preference for EBGP routing, is generated effectively referring to route priority.
C. See the following entry in the BGP routing table:* 172161.11/32 000010 0? Indicates that the route is available non-optimal
D. For next_hop unreachable routes when invalid routes, do not participate in the preferred.
/R1Jospf1lRL-osp- jarea.2[RLospf-1-arca-0002]network1001310000 As shown in the configuration, the administrator configured OSPF but RI on R1 You cannot learn routes for other routing rings. Then the possible cause is the question).
Router A has an IP route entry with a purposeful CIDR block of 10001/32 and an outgoing interface of GigabitEthernetO/0/1. Now add the following configuration: acd number 2000 rule 10 permit source1001.10#traffic classifier test if-match acl 2000 # traffic behavior test remarkdscp cs3#traffic policy test classifier test behavior test#
interfaceGigabitftherneto/0/1 ip address 1001212552552550 traffic-policy test outbound#assuming router A received a destination IP of 10001 Of packets, the following statements are correct:
Auto-negotiate mode is to obtain the maximum interface rate and operating mode, the network administrator configures all Ethernet interface rates of a working switch to 10OMbps, and the operating mode is configured as Full-duplex, when a network card is configured After the auto-negotiate workstation is connected to the switch, the negotiation result is that the interface rate is 10OMbps and the working mode is half-duplex, which of the following explanations is the most reasonable for this phenomenon?
Is the following description of the differences between IGMP name versions correct?
Among the routing policy tools commonly used by BGP, which ones can be used to filter routes?
The main routing policy tools that BGP can use are Filter-policy and Route-policy, where Fate-policy can only filter routes and Route-policy can only modify routes
Huawei's two switches SWA and SWB are connected together by 7 Ethernet cables, and static link clustering is configured, and the corresponding port on the switch SWA is Ethernet 1/0/1 ?Ethernet1/0/2?Ethernet 1/0/3?Ethernet 1/0/4?Ethernet 1/0/5, Ethernet1/0/6, Ethernet 1/0/7, configured in order of port if the switch SWA, SWB supports only 6 ports per aggregation group
WRED is configured on the newly deployed router HW. What is the correct description of the WRED features below? (Multiple choice questions).
What is the following correct for the process of registering the source-side DR with RP in PIM-SM?
The multicast IP address is 2291301301, and its corresponding MAC address is :(Multilist)
What categories can ACLs be divided into? A. Advanced ACLs
B. Two-layer ACL
C. User-defined ACLs
D. Basic ACL
Firewall security policies have the condition for traffic matching to be ?( Multi-select)
In an MPLS BGPVPN networking that does not enable MPLS penultimate hop pop-up technology. When the message reaches the last hop PE, the message has two layers of labels, and the two layers of label values can be the same.
If four routers run ISIS and have established an adjacency relationship, and the area code and router rank are marked as shown in the figure, what is the cost value of R4 reaching 10022/32?
When the IPv6 address of a host is configured with a stateless address configuration, and other parameters other than the address are obtained through DHCPv6, how to set the M and 0 bits in the RA message ?
The switch SWA and SWB are connected together by 2 Ethernet links, where the switch SWA has the following interface configuration:
RTA is the source DR router, RTB is the RP router, and the multicast source sends multicast data to the RTA, but the PIM is not visible on the RTB Register the multicast source to which the message is registered, then the possible causes are ?
The means of the LAND attack is that the attacker sends an SVN packet message with the same source and destination addresses to the target host, the source port and the destination port are the same, and the receiver waits for the final ACK packet to be sent , the connection is always in a semi-connected state, resulting in a full limited TCP reception Waste of resources
Which nationality meets the following two conditions: 1] BGP Router A can choose whether the Ulpdate message is based on the nationality. ( ) If Router B receives a Updae message containing a cross-hatch, run-by B does not have an identified solidity, but will also contain a multifaceted] Ulpdate retracts the advertisement to Router C. Router C may recognize and apply this attribute. (Multiple choice questions).
A router Router LSA is shown in the figure below, and the following statement is incorrect?
In a multicast network running PIM-SM mode, how does the router choose the upstream interface?
In an intra-domain MPLSVPN network, when a packet enters the public network and is forwarded, it is encapsulated with two layers of MPLS tags, and the description of the two layers of tags in the following options is incorrect
QinQ technology is a technology that extends the VLAN space by adding a layer of 8021Q tag messages to the extended VLAN. The function of space, the following statement about QInQ is mispronounced?
IS-IS supports the processing and computation of IPv6 routes by adding ATLPs to carry IPv6 addresses and reachability information.
The fields that represent priority in the VLAN (8021Q) data encapsulation are a total of 6 bits.
The BSR/RP mechanism described below describes the correct determination ?( Multiple choice questions).
There can be multiple C-BSRs in the
What command can be used to prevent users from accessing multiple devices through the HUB on the switch's access port?( Radio).