MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.
Which of the following items are included in static information collection and analysis?
gRPC (Google Remote Procedure Call) is a language-neutral, platform-neutral, and open-source remote RPC system that supports unary RPCs and streaming RPCs.
Which of the following service methods are NOT supported by gRPC?
In Huawei Open Programmability System (OPS), /ifm/interfaces/interface is the URL used to identify a device's managed object.
Which of the following technologies can be used to measure performance based on actual service traffic in Huawei's CloudWAN solution?
In the figure, SR-MPLS is enabled on R1, R2, and R3. The SRGB (Segment Routing Global Block) range on R3 is from 20000 to 21000, and the prefix SID index configured on the loopback1 interface of R3 is 30.
In this case, the MPLS label corresponding to the loopback1 interface of R3 is _____.
(Enter an Arabic numeral without symbols.)
In SSP packages, Jinja2 templates are used to implement mapping. In the Jinja2 syntax, {% ... %} contains control structures, for example, a 'for' loop.
A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows:
[~CE]display telemetry subscription
Sub-name : Sub1
Sensor group:
Sensor-name Sample-interval(ms) State
Sensor1 1000 RESOLVED
Destination group:
Dest-name Dest-IP Dest-port State Vpn-name Protocol
Dest1 192.168.56.1 20000 RESOLVED - GRPC
Sub-state : PASSIVE
Total subscription number is : 1
Which of the following statements is incorrect?
In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?
Which of the following statements about BGP EVPN principles are correct in a scenario where a VXLAN tunnel is dynamically established through BGP EVPN?
Network Admission Control (NAC) needs to be deployed on the network shown in the figure. Drag a proper authentication mode to each authentication point.
Which of the following statements about SR-MPLS Policy candidate paths are correct?
Which of the following statements is incorrect about the user authentication points on the network?
The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.
When you configure a virtualized campus network on iMaster NCE-Campus, Fit APs can immediately go online after you add them to iMaster NCE-Campus.
Which of the following commands is used to adjust the cost of an IS-IS interface?
Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.
An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.
Which of the following statements about static VXLAN tunnel configuration are correct?
BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.
In a BGP/MPLS IP VPN scenario, if a PE and CE use OSPF to exchange routing information, domain IDs are used to identify whether the routes imported to VPN instances are from the same OSPF domain.
On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?
In the following figure, all routers are running OSPF. Given this, which of the following statements is correct?
Man-in-the-middle attacks (MITM) or IP/MAC Spoofing attacks are common on intranets and can cause information leakage.
Which configuration method can prevent these attacks?
On a campus network, iMaster NCE-Campus is used to deploy two VNs (Virtual Networks): R&D VN and Marketing VN. Users in these two VNs belong to two separate security groups.
The campus network requires R&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?
Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects and manage network devices.
Which of the following HTTP methods is used to configure the value of a network device’s managed object?
An O&M platform mainly provides unified monitoring and performance management for network devices. Which of the following is NOT device monitoring data?
In typical "two-city three-center" networking, into which layers is the bearer WAN divided?
The IS-IS Level-1 neighbor relationship is not established between R3 and R4. Referring to the following information, what is the possible cause?
An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?
On a router, SRv6 is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?
[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32
In the following figure, OSPF is enabled on all router interfaces. The IP addresses marked in the figure belong to Loopback0 of the routers.
The Loopback0 addresses of R1 and R2 are advertised in Area 1, the Loopback0 address of R4 is advertised in Area 0, and the Loopback0 addresses of R3 and R5 are advertised in Area 2. Given this, which of the following IP addresses can ping each other?
Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.
Refer to the configuration in the figure. Which queue on R2 do packets of PC1 enter by default?
In DU label advertisement mode, if the liberal label retention mode is used, the device reserves labels received from all the LDP peers regardless of whether the LDP peer is the optimal next hop for reaching the destination network.
The TTL field encapsulated in the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are correct?
In the Huawei SD-WAN Solution, the topologies of different VNs must be the same.
When an SSH client logs in to an SSH server that is configured only with username and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).
Exhibit:
A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?
During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.
What can be determined from the following figure?
Public Routing Table : ISIS
Summary Count: 6
ISIS Routing Table's Status : < Active >
Summary Count: 6
Destination : 3000:FDEA::4
NextHop : FE80::2E0:FCFF:FE98:2577
Cost : 20
Interface : GigabitEthernet0/0/1
PrefixLength : 128
Preference : 15
Protocol : ISIS-L2
Flags : D
As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)
According to the following information displayed on a router, which of the following are the causes of the failure in establishing an OSPF adjacency relationship?
OSPF error statistics:
1: Hello timer mismatch
0: Netmask mismatch
0: Bad checksum
0: Bad authentication type
0: Unknown neighbor
0: Extern option mismatch
MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as an FEC allocation standard?