Exam4Training

Huawei H12-222_V2.5-ENU HCIP-Routing & Switching-IENP V2.5 Online Training

Question #1

In the IP message, the Tos field is used to mark the Qos, and the first 6 bits are used to mark the DSCP in the Tos field.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #2

The traditional packet loss strategy adopts the tail-drop method, which will cause the TCP global synchronization phenomenon.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #3

Among the following options, the highlight of the service orchestration of the Agile controller is: (Multiple Choice)

  • A . Based on the three-layer GRE tunnel arrangement, the networking mode and deployment location of business equipment are more flexible.
  • B . Perform business orchestration through topology visualization, with simple configuration and convenient management.
  • C . The addition and deletion of service equipment does not change the forwarding route of the existing network, and does not change the physical topology of the existing network.
  • D . No manual maintenance is required, and the business is analyzed and arranged automatically.

Reveal Solution Hide Solution

Correct Answer: ABC
Question #4

Among the following application scenarios, the one that does not belong to the guest access management of the Agile controller is:

  • A . Customer communication, exchanges, visits, etc. access the corporate network and access corporate public resources or the Internet.
  • B . Ordinary people access the Internet through the network provided by public institutions.
  • C . Customers consume in the enterprise and connect to the enterprise network to access the Internet.
  • D . Company employees travel to the branch office and connect to the branch office network to access the company network

Reveal Solution Hide Solution

Correct Answer: D
Question #5

The main functions of the VIM management module in NFV include resource discovery, resource allocation, resource management and _______.

  • A . Resource scheduling
  • B . Resource monitoring
  • C . Resource recovery
  • D . Troubleshooting

Reveal Solution Hide Solution

Correct Answer: D
Question #6

The main technical genres of SDN advocate that SDN adopts a layered open architecture, so what is used to advocate, define a centralized architecture and Openflow?

  • A . ONF
  • B . IEIF
  • C . ETSI
  • D . ITUa

Reveal Solution Hide Solution

Correct Answer: A
Question #7

In order to avoid the TCP global synchronization phenomenon, the congestion avoidance mechanisms that can be used are: (Multiple Choice)

  • A . RED
  • B . WRED
  • C . Tail-Drop
  • D . WFQ

Reveal Solution Hide Solution

Correct Answer: AB
Question #8

Which of the following is the command to configure the listening address of the SDN controller?

  • A . Openflow Listening-ip 1.1.1.1
  • B . Sdn controller souce-address 1.1.1.1
  • C . controller-ip 1.1.1.1
  • D . Sdn Listening-ip 1.1.1.1

Reveal Solution Hide Solution

Correct Answer: A
Question #9

The dynamic IP address assigned by the DHCP server to the client usually has a certain lease period, so regarding the description of the lease period, which of the following is wrong?

  • A . The lease renewal timer is 50% of the total lease. When the "lease renewal timer" expires, the DHCP client must update the IP address.
  • B . The rebinding timer is 87.5% of the total lease period.
  • C . If the "rebinding timer" expires, but the client is still there; after receiving a response from the server, it will continue to send DHCP REQUEST messages to the DHCP server that has previously assigned an IP address until the total lease expires
  • D . During the lease period, if the client receives a DHCP NAK message, the client will immediately stop using this IP address, return to the initialization state, and apply for a new IP address again.

Reveal Solution Hide Solution

Correct Answer: C
Question #10

NFV is often deployed in which of the following application environments? (Multiple Choice)

  • A . Data Center
  • B . Network node
  • C . User access side
  • D . Client/Server

Reveal Solution Hide Solution

Correct Answer: ABC

Question #11

ASPF (Application Specific Packet Filter) is a packet filter based on the application layer. It checks the application layer protocol information and monitors the connected application layer protocol status, and implements a special security mechanism through the Server MAP table.

Regarding the statement about ASPF and Server map table, which of the following is wrong?

  • A . ASPF monitors the messages in the communication process.
  • B . ASPF dynamically creates and deletes filtering rules.
  • C . ASPF uses Ser; ermak table to dynamically allow multi-channel protocol data to pass.
  • D . The five-tuple Server map table entry implements a function similar to the session table.

Reveal Solution Hide Solution

Correct Answer: D
Question #12

Stream mirroring is divided into two modes: local stream mirroring and remote stream mirroring.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #13

Which of the following modules is not a functional component within the NFV framework?

  • A . VIM
  • B . VNF
  • C . VNFM
  • D . OSS

Reveal Solution Hide Solution

Correct Answer: D
Question #14

The role of the Agile Controller server does not include which of the following options?

  • A . Business Manager
  • B . Business Controller
  • C . Security Posture Manager
  • D . Business Inspector

Reveal Solution Hide Solution

Correct Answer: D
Question #15

MPLS, also known as multi-protocol label switching technology, it can be said that the core of MPLS technology is label switching.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #16

As shown in the figure, if MPLS LSP is configured in the network and a local LDP session is implemented between SWA and SWB, which of the following statement is correct?

  • A . The configuration is correct
  • B . The Mpls lsr-id of two devices cannot be configured to be the same
  • C . No need to enable MPLS globally
  • D . No need to enable MPLS on the port

Reveal Solution Hide Solution

Correct Answer: B
Question #17

The three elements of the Servermap table of the USG series firewalls do not include:

  • A . Destination IP
  • B . Destination port number
  • C . Agreement number
  • D . Source IP

Reveal Solution Hide Solution

Correct Answer: D
Question #18

In inter-domain packet filtering, which of the following options belongs to the outbound direction?

  • A . Trust → untrust
  • B . Untrust → trust
  • C . Untrust → dmz
  • D . trust → local

Reveal Solution Hide Solution

Correct Answer: A
Question #19

The remote alarm notification methods supported by Esight network management include: (Multiple Choice)

  • A . Mail
  • B . Voice
  • C . SMS
  • D . WeChat

Reveal Solution Hide Solution

Correct Answer: AC
Question #20

Which common configuration methods does VXLAN support? (Multiple Choice)

  • A . Configuration via virtualization software
  • B . Configure via SDN controller
  • C . Configure via SNMP protocol
  • D . Automatic configuration

Reveal Solution Hide Solution

Correct Answer: AB

Question #21

In response to different needs, the DHCP server supports multiple types of address allocation strategies, not including:

  • A . Automatic allocation method
  • B . Dynamic allocation method
  • C . Duplicate allocation method
  • D . Manual allocation method

Reveal Solution Hide Solution

Correct Answer: C
Question #22

Regarding the description of the LDP Session establishment process, which of the following is correct? (Multiple Choice)

  • A . Two LSRs send HELLO messages to each other. The HELLO message carries the transmission address, and the party with the larger transmission address acts as the active party to initiate the establishment of a TCP connection.
  • B . If the Hello Message does not carry the Transport Address, the destination IP address of the Hello Message is used to establish a TCP connection, and the party with the larger IP address is the active party to initiate the establishment of the TCP connection.
  • C . The proactive party will send an Advertisement Message to negotiate the relevant parameters for establishing an LDP session, including the LDP protocol version and label distribution method. KeePalive maintains the timer value, maximum PDU length, and label space.
  • D . If the passive party can accept the relevant parameters, it will send Initialization I, message, and at the same time send a keepalive message to the active party.

Reveal Solution Hide Solution

Correct Answer: AD
Question #23

The interface IP address and virtual IP address of VRRP can be the same.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #24

Man-in-the-middle attacks or IP/MAC spoofing attacks can cause information leakage and other hazards, and they are more common in intranets.

In order to prevent man-in-the-middle attacks or IP/MAC spoofing attacks, the configuration methods that can be taken are:

  • A . Configure Trusted/Untrusted interface.
  • B . Limit the maximum number of MAC addresses that can be learned on the switch interface.
  • C . Enable DHCP snooping to check the function of CHADDR field in the DHCP REQUEST message.
  • D . Configure the linkage between DHCP snooping and DAI or IPSG on the switch.

Reveal Solution Hide Solution

Correct Answer: D
Question #25

Regarding the description of the MAC address spoofing attack, which of the following is wrong?

  • A . MAC address spoofing attack mainly uses the MAC address learning mechanism of the switch.
  • B . The attacker can implement MAC address spoofing attacks by sending a forged source Mac address data frame to the switch.
  • C . MAC address spoofing attacks will cause the switch to learn the wrong mapping relationship between MAC address and IP address.
  • D . MAC address spoofing attacks will cause the switch to send data to the correct destination instead of the attacker.

Reveal Solution Hide Solution

Correct Answer: C
Question #26

The command to configure the linkage between BFD and static default route is:

  • A . IP route-static 0.0.0.0.0.0.0.0 10.0.12.2 bfd-session 1
  • B . IP route-static 0.0.0.0.0.0.0.0 10.0.12.2 track bfd-session 1
  • C . IP route-static 0.0.0.0.0.0.0.0 10.0.12.2 track 1
  • D . IP route-static 0.0.0.0.0.0.0.0 10.0.12.2 track session1

Reveal Solution Hide Solution

Correct Answer: B
Question #27

Intserv model, before the application sends a message, needs to apply to the network to reserve resources.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #28

NAT technology can realize data secure transmission by encrypting data.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #29

To realize all interfaces of the device, the command to enable the linkage function between BFD and OSPF is:

  • A . bfd enable
  • B . bfd all-interface enable
  • C . all-interface bfd enable
  • D . undo bfdall-interface disable

Reveal Solution Hide Solution

Correct Answer: B
Question #30

Single-packet attack means that an attacker controls a zombie host and sends a large number of attack messages to the target network, causing the congestion of the attacked network link and exhaustion of system resources.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B

Question #31

Among the following options, the technologies that do not belong to the OVERLAY VPN model are:

  • A . GRE
  • B . IPSec VPN
  • C . SSL VPN
  • D . L2TP VPN

Reveal Solution Hide Solution

Correct Answer: D
Question #32

In the admission control scenario of the Agile Controller, which of the following options about the roles of the RAD IUS server and client is correct?

  • A . The Agile Controller integrates all the functions of the RADIUS server and client.
  • B . The Agile Controller acts as a RADIUS server, and the user terminal acts as a RADIUS client.
  • C . The authentication device (such as an 802.1X switch) acts as a RADIUS server, and the user terminal acts as a RADIUS client.
  • D . The Agile Controller acts as a RADIUS server and an authentication device (such as an 802.1X switch) as a RADIUS client.

Reveal Solution Hide Solution

Correct Answer: D
Question #33

In ESIGTH, what conditions can be used to set alarm shielding rules? (Multiple Choice)

  • A . Effective time
  • B . Effective period
  • C . Alarm source
  • D . Alarm

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #34

When the host and server in the same security zone communicate with each other, it is not necessary to use NAT for address translation.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #35

Regarding the following description of the firewall’s inter-domain security strategy, which of the following is correct?

  • A . The inter-domain security policy is matched according to the order of arrangement, and the first one is matched first
  • B . The inter-domain security policy is matched according to the size of the ID number, and the smaller number is matched first.
  • C . The inter-domain security policy is matched according to the size of the ID number, and the larger number is matched first.
  • D . The inter-domain security policy is automatically arranged according to the size of the serial number. When the arrangement order is changed, the number also changes.

Reveal Solution Hide Solution

Correct Answer: A
Question #36

Regarding the configuration description, which of the following is wrong?

  • A . Configure GigabitEthernet0/0/1 as a trusted interface.
  • B . If there is no SUBOPTION1 information of OPTION82 in the DHCF request message received by the GigabitEthernet0/0/1 interface, the device will generate OPTION82 and insert it into the message
  • C . Enabling the DHCP Snooping configuration can be used to prevent the DHCP server counterfeiters from attacking.
  • D . Enabling the DHCP Snooping configuration can be used to prevent ARP spoofing attacks

Reveal Solution Hide Solution

Correct Answer: B
Question #37

The configuration command of the NAT address pool is as follows, the meaning of the no-pat parameter is: nat address-group 1 section 0 202.202.168.10 202.202 168.20 nat-mode no-pat

  • A . No address translation
  • B . Perform port multiplexing
  • C . Do not convert the source port
  • D . Do not convert the destination port

Reveal Solution Hide Solution

Correct Answer: C
Question #38

Regarding the description about business accompanying of Agile Controller, which of the following is correct? (Multiple Choice)

  • A . The administrator should select the appropriate user authentication point and policy enforcement point when configuring the business accompanying.
  • B . In business accompanying, you can define user-class security groups. The members of this part of the security group mainly refer to a static network segment or server resource of the network. Their IP needs to be manually bound to the security group.
  • C . In business accompanying, a matrix relationship is used to describe the access authority relationship from one security group (such as a user) to another security group (such as a server).
  • D . In business accompanying, by specifying the forwarding priority of the security group to which certain VIP users belong, the network experience of these people is guaranteed.

Reveal Solution Hide Solution

Correct Answer: ACD
Question #39

MPLS has the concept of forwarding equivalence class (FEC-Forwarding Equivalence Class), so FEC cannot be allocated based on which of the following standards?

  • A . Fragment offset
  • B . Destination Access
  • C . Application Protocol
  • D . Class of Service

Reveal Solution Hide Solution

Correct Answer: A
Question #40

Rapid detection technology can detect communication failures with neighboring equipment as early as possible, so that the system can take measures in time to ensure uninterrupted business.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A

Question #41

During the establishment of the LDP session, the openSent state will be experienced. When the openSent state receives the Initialization message and then sends the keepAlive Message, its state will migrate to:

  • A . Initialization
  • B . Openrec
  • C . operational
  • D . Non-existent

Reveal Solution Hide Solution

Correct Answer: B
Question #42

The VPN configuration on a certain device is as follows, which of the following description about the configuration command is correct?

  • A . This command is configured on the CE device of the customer network.
  • B . Route-Distinguisher 1:1 indicates that the value of RD is 1:1, and RD does not have to be globally unique
  • C . vpn-target 1:1 exportcommunity indicates that the export target of the VPN is 1:1
  • D . vpn-target 2:2 importcommunity indicates that the import target of VPN is 2:2, and only one import target can be set.

Reveal Solution Hide Solution

Correct Answer: C
Question #43

Which of the following options is correct about the description of RT? (Multiple Choice)

  • A . Each VPN instance is associated with one or more pairs of VPN target attributes to control the publishing and receiving of VPN routing information between sites.
  • B . RT can be divided into two types of VPN target attributes: export target and impor target
  • C . The settings of export target and impor target are independent of each other, and multiple values ​​can be set to achieve flexible VPN access control.
  • D . The RT value is advertised to neighbors through Update messages in the form of BGP extended community attributes.

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #44

LDF is a protocol specially formulated for label distribution. There are many types of messages. Among them, the messages used to announce and maintain the existence of an LSR in the network are:

  • A . Discovery message
  • B . Session message
  • C . Advertisement message
  • D . notifcation message

Reveal Solution Hide Solution

Correct Answer: A
Question #45

The methods of data collection are mainly divided into: (Multiple Choice)

  • A . Spectroscope physical collection
  • B . Collect through port mirroring
  • C . NMS centralized collection
  • D . Automatic collection

Reveal Solution Hide Solution

Correct Answer: ABC
Question #46

​​In the network shown in the following figure, if you want to realize the remote LAP session between SWA and SWC, which of the following statement is correct?

  • A . The configuration in the figure can be achieved
  • B . Need to configure the direct connection port to establish a TCP connection
  • C . Need to create a remote peer, and then specify the Isr-id of the peer
  • D . Specify the Isr-id of the peer in the system view

Reveal Solution Hide Solution

Correct Answer: C
Question #47

Complex flow classification refers to the classification of messages based on information such as quintuples (source/destination address, source/destination port number, protocol type), etc., and is usually applied at the core of the network.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #48

When two devices with the same priority compete for the role of Master at the same time, the device with the interface with the smaller IP address should be selected as the Master device.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #49

Which of the following steps are included in the basic working process of SDN? (Multiple Choice)

  • A . Topological information collection
  • B . Network element resource information collection
  • C . One forwarding information collection
  • D . Generate internal switching routes

Reveal Solution Hide Solution

Correct Answer: ABD
Question #50

Regarding the following statements about packet loss in QoS, which is wrong?

  • A . When the router receives a data packet, it may be unable to process the data packet because the CPU is busy, resulting in packet loss.
  • B . When data packets are scheduled to the queue, packet loss may occur because the queue is full.
  • C . When data packets are transmitted on the link, they may be lost due to link failures and other reasons.
  • D . Packet loss is generally caused by delay. When the queue is full, tail drop is generally used to drop packets.

Reveal Solution Hide Solution

Correct Answer: D

Question #51

When pinging the IP address of a certain interface of the firewall on the firewall, these messages will be handed over to the internal module of the firewall for processing and will not be forwarded.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #52

According to IP Precedence, MPLS EXP or 802.1P information, packets can be divided into how many types of services?

  • A . 2
  • B . 4
  • C . 6
  • D . 8

Reveal Solution Hide Solution

Correct Answer: D
Question #53

In the MPLS system, there are two ways to publish labels, namely: (Multiple Choice)

  • A . Free way
  • B . Independent
  • C . Conservative approach
  • D . Orderly approach

Reveal Solution Hide Solution

Correct Answer: BD
Question #54

Which of the following are the main goals of network management? (Multiple Choice)

  • A . Ensure that network users receive the expected network service quality and technical service information.
  • B . Reduce equipment relocation costs.
  • C . Reduce the service life of network equipment and extend the service cycle.
  • D . Help network engineers face complex network data, and ensure that the data can be quickly and comprehensively presented to users.

Reveal Solution Hide Solution

Correct Answer: AD
Question #55

For IPv4 packets, we can perform simple flow classification according to what information in the packet? (Multiple Choice)

  • A . DSCP information
  • B . IP Precedence Information
  • C . Traffic Class information
  • D . 802.1P information

Reveal Solution Hide Solution

Correct Answer: AB
Question #56

Which of the following description about the function of traffic supervision is correct? (Multiple Choice)

  • A . The message cannot be colored
  • B . Colorize the message
  • C . Cache the packets that exceed the traffic limit
  • D . The packets that exceed the traffic limit cannot be cached

Reveal Solution Hide Solution

Correct Answer: BD
Question #57

Compared with traffic policing, traffic shaping introduces queues for buffering traffic exceeding the limit.

Regarding traffic shaping, which of the following description is incorrect?

  • A . Compared with traffic policing, traffic shaping has better anti-burst capabilities.
  • B . Traffic shaping allows packets to be sent out at a relatively uniform speed.
  • C . Due to the introduction of queues, when congestion occurs, the delay of messages increases relatively
  • D . Voice services are more suitable for traffic shaping rather than traffic policing

Reveal Solution Hide Solution

Correct Answer: D
Question #58

In the MPLS VPN network, when the data packet enters the public network and is forwarded, it will be encapsulated with two layers of MPLS labels. Regarding the description of the two layers of labels, which of the following options is wrong? (Multiple Choice)

  • A . The outer label of MPLS VPN is called the private network label, and the inner label is called the public network label.
  • B . The outer label of MPLS VPN is allocated by LDP protocol or statically, and the inner label is allocated by the MP-BGP neighbor of the opposite end.
  • C . By default, the outer label is ejected before the packet is forwarded to the last-hop device.
  • D . The outer label is used to correctly send the data packet to the corresponding VPN on the PE device.

Reveal Solution Hide Solution

Correct Answer: AD
Question #59

Regarding the description about the VRRP, which of the following is wrong?

  • A . The routers in the VRRP group elect a Master based on priority
  • B . The master router sends a gratuitous ARP message to notify its virtual MAC address to the device connected to it.
  • C . If the Master router fails, the Backup router in the virtual router will re-elect a new Master based on the priority
  • D . Because the priority range is 1-255, when the priority value in the VRRP notification message received by the Backup device is 0, Backup will discard the message without any processing.

Reveal Solution Hide Solution

Correct Answer: D
Question #60

Qos service model includes: (Multiple Choice)

  • A . Best-EffortService model
  • B . Integrated Service. Model
  • C . Differentiated Service model
  • D . FIFO Service model

Reveal Solution Hide Solution

Correct Answer: ABC

Question #61

In the MPLS network as shown in the figure, which of the following descriptions is correct? (Multiple Choice)

  • A . The switch uses a straight connection port to establish a TCP connection.
  • B . The neighbor LDP ID of the switch is the port IP address
  • C . The neighbor LDP ID of the switch is the neighbor’s MPLS lsr-id
  • D . The switch uses lsr-id to establish a TCP connection

Reveal Solution Hide Solution

Correct Answer: AC
Question #62

Regarding the description of the default security zone of the USG series of security firewalls, which is correct?

  • A . The default security zone can be deleted
  • B . The default security zone can modify the security level.
  • C . The default security zone cannot be deleted, but the security level can be modified.
  • D . There are 4 default security zones.

Reveal Solution Hide Solution

Correct Answer: D
Question #63

In the firewall inter-domain security policy, which of the following data flows is not in the outbound direction?

  • A . Data flow from the DMZ zone to the untrust zone
  • B . Data flow from the trust zone to the DMZ zone
  • C . Data flow from trust zone to untrust zone
  • D . Data flow from DMZ area to local area

Reveal Solution Hide Solution

Correct Answer: D
Question #64

Configure the remote port mirroring function on the Huawei router to realize the remote port mirroring message, which can be transmitted to the monitoring equipment through the three-layer IP network, the command is:

  • A . mirror-sever destination-IP 10.1.0.1 source-ip 192.168.1.1
  • B . monitor-sever destination-ip10.1.0.1 source-ip 192.168.1.1
  • C . Abserve-sever destination-IP 10.1.0.1 source-ip 192.168.1.1
  • D . sever destination-IP 10.1.0 1 source-ip 192.168.1.1

Reveal Solution Hide Solution

Correct Answer: C
Question #65

VPN models are mainly divided into two types, one is Overlay VPN, and the other is Peer-to-Peer VPN.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #66

In the process of the client applying for an IP address through DHCP and assigning an IP address to the DHCP server, which of the following messages are usually unicast? (Multiple Choice)

  • A . DHCP OFFER
  • B . DHCP REQUEST
  • C . DHCP DISCOVER
  • D . DHCP ACK

Reveal Solution Hide Solution

Correct Answer: AD
Question #67

If the two interfaces of the firewall are divided into the same area, then the flow of data packets between the two interfaces must also go through the inter-domain packet filtering process.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #68

The eSight single server mode allows only one user to log in at most. When other users log in, it will prompt the user to log in.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #69

The broadcast domain of VXLAN is called:

  • A . Broadcast domain
  • B . Exchange domain
  • C . Bridge domain
  • D . VLAN domain

Reveal Solution Hide Solution

Correct Answer: C
Question #70

Among the following options, which of the following the description about the Agile Controllerr guest account application method is incorrect?

  • A . Can be created by the administrator.
  • B . It can be created by employees with guest management authority.
  • C . Can be created by the reception staff.
  • D . Visitors can register themselves.

Reveal Solution Hide Solution

Correct Answer: C

Question #71

Regarding the description of Network Address Port Translation (NAPT) and Only Translating Network Address (NO-PAT), which of the following statements is correct?

  • A . After NAPT conversion, for external users, all messages will only come from the same IP address.
  • B . NO-PAT only supports protocol port conversion at the transport layer.
  • C . NAT only supports protocol address translation at the network layer.
  • D . NO-PAT supports protocol address translation at the network layer.

Reveal Solution Hide Solution

Correct Answer: D
Question #72

Among the following options, which describes the Agile Controller’s business orchestration concept correctly? (Multiple Choice)

  • A . In business orchestration, the User Control List refers to user-level ACL control, using rules defined by the source security group, destination security group, and port number of the data packet.
  • B . Orchestration equipment refers to equipment that guides business flows in an orderly manner, generally refers to switches.
  • C . Business equipment refers to equipment that performs secure business processing on the business flow introduced by the orchestration equipment, which mainly includes firewall equipment, anti-virus equipment, and Internet behavior control equipment.
  • D . The business chain refers to the business data processed by the GRE tunnel.

Reveal Solution Hide Solution

Correct Answer: ABC
Question #73

Which of the following attacks is not a thousand network layer attacks?

  • A . IP spoofing attack
  • B . Smurf attack
  • C . ARP spoofing attack
  • D . ICMP attack

Reveal Solution Hide Solution

Correct Answer: C
Question #74

LDP is a protocol specially formulated for label distribution. It has many types of messages, among which the messages used to generate, change and delete FEC label mapping are:

  • A . Discovery message
  • B . Session message
  • C . Advertisement message
  • D . Notification message

Reveal Solution Hide Solution

Correct Answer: C
Question #75

Regarding the default security zones Trustt and untrust of firewalls, which of the following statement is correct? (Multiple Choice)

  • A . The direction of access from the Trust zone to the untrust zone is the outboud direction.
  • B . Access the outboud direction from the trust zone.
  • C . The security level of Trust is 85.
  • D . The security level of Untrust is 50.

Reveal Solution Hide Solution

Correct Answer: AC
Question #76

In the Diff-Serv network, the maximum number of values ​​that can be defined with DSCP is:

  • A . 3
  • B . 6
  • C . 8
  • D . 64

Reveal Solution Hide Solution

Correct Answer: D
Question #77

If DSCP (the first 6 bits of the Tos field) is used, how many categories can the message be divided into at most?

  • A . 8
  • B . 16
  • C . 32
  • D . 64

Reveal Solution Hide Solution

Correct Answer: D
Question #78

What kind of information of message can be used for simple flow classification for tags?

  • A . DSCP information
  • B . IP Precedence Information
  • C . MPLS EXP information
  • D . 802.1P information

Reveal Solution Hide Solution

Correct Answer: C
Question #79

In the TCP/IP v4 version, which of the following security risks exist? (Multiple Choice)

  • A . Lack of data source verification mechanism
  • B . Lack of confirmation mechanism for data packets
  • C . Lack of a verification mechanism for data integrity
  • D . Lack and password guarantee mechanism

Reveal Solution Hide Solution

Correct Answer: ACD
Question #80

Jitter is caused by unequal end-to-end delay of packets belonging to the same stream.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version