The Agile Controller is an automated control system for network resources. It provides a unified policy engine to realize unified access control policies within the entire organization, and implements 5W1H-based (user identity, access time, access location, device type, device source, and access mode) authentication and authorization.

The Agile Controller is an automated control system for network resources. It provides a unified policy engine to realize unified access control policies within the entire organization, and implements 5W1H-based (user identity, access time, access location, device type, device source, and access mode) authentication and authorization.A . TRUEB . FALSEView...

November 23, 2018 No Comments READ MORE +

Which of the following MPLS statements is false?

MPLS is a label forwarding technology. Which of the following MPLS statements is false?A . MPLS uses the connection-oriented control plane and connectionless data plane.B . The control plane transmits route information and distributes labels. The data plane transmits packets along the created label switched path (ISP).C . Switches in...

November 21, 2018 No Comments READ MORE +

The interface IP address and VRRP virtual IP address can be the same.

The interface IP address and VRRP virtual IP address can be the same.A . TRUEB . FALSEView AnswerAnswer: A

November 20, 2018 No Comments READ MORE +

Which of the following are highlights of the Service Chain component of the Agile Controller? (Multiple Choice)

Which of the following are highlights of the Service Chain component of the Agile Controller? (Multiple Choice)A . Services are orchestrated based on the Layer 3 GRE tunnels and service devices can be deployed flexibly.B . Service orchestration operations are visualized in the topology, simplifying the configuration and management.C ....

November 16, 2018 No Comments READ MORE +

Which are the major limitation that MPLS VPN solves?

MPLS VPN is used to solve some limitations of traditional VPN technology. Which are the major limitation that MPLS VPN solves?A . Private routes cannot communicate with each other.B . Leased lines are expensive.C . Bandwidth resources cannot be fully used.D . The address space is overlapping.View AnswerAnswer: D

November 9, 2018 No Comments READ MORE +

SDN technology advocate layered open architecture. Then which organization advocate and defines the centralized architecture and Open Flow?

SDN technology advocate layered open architecture. Then which organization advocate and defines the centralized architecture and Open Flow?A . ONFB . IETFC . ETSID . ITUView AnswerAnswer: A

October 30, 2018 No Comments READ MORE +

What about all outgoing labels in the label forwarding table of a MPLS-capable device for the same route with the same next hop?

What about all outgoing labels in the label forwarding table of a MPLS-capable device for the same route with the same next hop?A . They must be different.B . They must be the same.C . They may be the same.View AnswerAnswer: B

October 25, 2018 No Comments READ MORE +

What are differences between the DiffServ and IntServ models? (Multiple Choice)

What are differences between the DiffServ and IntServ models? (Multiple Choice)A . The DiffServ model provides different services destined for different destinations.B . The DiffServ model provides different services destined for different sources.C . The DiffServ model does not need to maintain the status of each flow.D . The DiffServ...

October 21, 2018 No Comments READ MORE +

Which of the following command is used to configure the listening address of the SDN controller?

Which of the following command is used to configure the listening address of the SDN controller?A . openflow listening-ip 1.1.1.1B . sdn controller souce-address 1.1.1.1C . controller-ip 1.1.1.1D . sdn listening-ip 1.1.1.1View AnswerAnswer: A

October 14, 2018 No Comments READ MORE +

Which of the following statements regarding the trusted and untrusted zones are true? (Multiple Choice)

Which of the following statements regarding the trusted and untrusted zones are true? (Multiple Choice)A . The direction for the access from the trusted zone to the untrusted zone is the outbound direction.B . The direction for the access from the trusted zone to the untrusted zone is the inbound...

October 4, 2018 No Comments READ MORE +