Country / Region
A. The backbone area of OSPF must be directly connected. Its direct connection can be ensured by using virtual connection.
B. The backbone area of IS-IS consists of all Level-2 and Level-1-2 systems. As there is no virtual connection, they are required to be physically consecutive.
C. The format of IS-IS protocol packets is TLV, which can be easily extended and supports various network protocols, such as IPv6. OSPFv2 protocol packets are based on IP and are too closely combined with IPv4. Therefore, it's difficult to extend the packets for support of IPv6.
D. Although both support large-scale hierarchal networks, OSPF is more widely applied in enterprise-grade networks.
A. The lack of the AS_PATH attribute indicates that the route was initiated by the local autonomous system. The BGP route is valid.
B. None of the routes learned from iBGP neighbors carry AS_PATH. The route is valid.
C. The iBGP neighbor of RTA has configured a routing policy for the outbound direction to delete AS_PATH. This BGP route is valid.
D. Due to the lack of the AS_PATH attribute, this BGP route is invalid.
A. A fully-meshed iBGP neighbor relationship must be established inside sub-autonomous systems of a confederation, and route reflectors cannot be used.
B. An eBGP neighbor relationship is established between sub-autonomous systems of a confederation, so LP cannot be transmitted across sub-autonomous systems.
C. The ID of a sub-autonomous system of a confederation can be the same as that of the primary autonomous system.
D. All BGP routers inside a confederation need to support the confederation function.
A. between ES and IS
B. between ISs in the same Area
C. between different Areas
D. between different Domains
A. 232.255.255.255
B. 240.0.0.5
C. 239.255.255.255
D. 224.0.0.13
A. The configuration is incorrect. You need to exit to the system view and configure the route, in order for the route to take effect.
B. The configuration is incorrect. For the next hop of the route, you should enter the peer IP address, instead of the interface name S1/0.
C. Interface S1/0 has been shut down.
D. Interface S1/0 has no IP address.
A. 010F-E200-0003
B. 0100-0CCD-CDD0
C. 0100-0CCD-CDD1
D. 0100-0CCD-CDD2
A. An IST is a segment of the CIST in an MST domain. The IST root is the highest-priority bridge in the MST domain.
B. The IST root is the bridge in the IST closest to the CIST root.
C. One MST domain can contain multiple MSTI instances, and different MST domains can contain different MSTI instances.
D. One MSTI instance can be mapped to multiple VLANs, and in different MST domains, the VLAN mappings can be different.
A. When the line connecting SWA with SWB is faulty, the destination MAC address of Flush packets sent by SWA is 000f-e269-42d1.
B. When the line connecting SWA with SWB is faulty, the destination MAC address of Flush packets sent by SWA is 000f-e269-42d2.
C. When the line connecting SWA with SWB is faulty, the destination MAC address of Flush packets sent by SWA is 000f-e269-42d3.
D. The other answers are incorrect.
A. The backup group uses the real MAC mode.
B. The backup group uses the virtual MAC mode.
C. The backup group vrid is 4.
D. The backup group vrid is 5.
A. within the committed rate
B. within the peak rate
C. above the committed rate
D. above the peak rate
The following command is configured on an MSR router:
acl basic 2003
rule 0 permit source 192.168.0.0 0.0.0.255
#
traffic classifier 1 operator and
if-match not acl 2003
#
traffic behavior 1
filter deny
#
qos policy 1
classifier 1 behavior 1
#
interface GigabitEthernet0/1
port link-mode route
ip address 192.168.1.1 255.255.255.0
qos apply policy 1 outbound
In this case, when outbound packets from the source addresses of 192.168.2.2 and 192.168.0.2 are forwarded through port G0/1, which of the following statements are correct? ______
A. Packets from the source address of 192.168.0.2 are forwarded normally.
B. Packets from the source address of 192.168.2.2 are forwarded normally.
C. The forwarding of packets from the source address of 192.168.0.2 is blocked.
D. The forwarding of packets from the source address of 192.168.2.2 is blocked.
A. After IPSec VPN enables NAT traversal, only the AH protocol can be adopted.
B. After IPSec VPN enables NAT traversal, only the ESP protocol can be adopted.
C. After IPSec VPN configures NAT traversal and detects the NAT environment, it will adopt UDP packet encapsulation.
D. Port 51 is used for packet encapsulation for IPSec VPN NAT traversal.
E. Port 500 or 4500 is used for packet encapsulation for IPSec VPN NAT traversal.
A. They can both separate address spaces.
B. They are both point-to-point tunnels.
C. GRE VPN cannot separate address spaces, and BGP/MPLS VPN can separate address spaces.
D. GRE VPN can provide advanced security such as data encryption, and BGP/MPLS VPN cannot provide such security.
A. Both the NTP client and server enable verification.
B. Neither the NTP client nor server enables verification.
C. The NTP client enables verification, and the server does not enable verification.
D. The NTP client does not enable verification, and the server enables verification.