As shown in the figure, there are two IPv6 networks that can access the IPv4 network. At the same time, an IPSEC tunnel needs to be established between the two IPv6 networks for communication. Which of the following encapsulation modes can meet the requirements above?

As shown in the figure, there are two IPv6 networks that can access the IPv4 network. At the same time, an IPSEC tunnel needs to be established between the two IPv6 networks for communication. Which of the following encapsulation modes can meet the requirements above? A . ESP + tunnel...

November 18, 2021 No Comments READ MORE +

If there are multiple receivers in a multicast group, the administrator enables IGMP-Snooping on the switch connecting the receiver. After the receiver receives the general query message from the querier, the receiver receives multiple receivers. How to respond?

If there are multiple receivers in a multicast group, the administrator enables IGMP-Snooping on the switch connecting the receiver. After the receiver receives the general query message from the querier, the receiver receives multiple receivers. How to respond?A . All recipients will respond to the Report message.B . Only when...

November 17, 2021 No Comments READ MORE +

Which ACL does the router HW1 need to configure to enable LAN-to-LAN traffic to pass through the encrypted VPN tunnel?

Router HW1 and router HW2 are connected to network A and network B respectively. As shown below, if you want to establish an IPsec VPN between router HW1 and router HW2. Which ACL does the router HW1 need to configure to enable LAN-to-LAN traffic to pass through the encrypted VPN...

November 17, 2021 No Comments READ MORE +

In an MPLS VPN network, different CE devices can exchange routing information with the same PE device using different routing protocols. The routing protocols used between different CE devices and the same device are independent of each other.

In an MPLS VPN network, different CE devices can exchange routing information with the same PE device using different routing protocols. The routing protocols used between different CE devices and the same device are independent of each other.A . TrueB .  FalseView AnswerAnswer: A

November 17, 2021 No Comments READ MORE +

RD is used to distinguish the same IP address in different VPNs. How many bits does the RD contain?

RD is used to distinguish the same IP address in different VPNs. How many bits does the RD contain?A . 64B . 32C . 16D . 128View AnswerAnswer: A

November 17, 2021 No Comments READ MORE +

Regarding the processing mode of MPLS for TTL, which description is correct?

Regarding the processing mode of MPLS for TTL, which description is correct?A . In Pipe mode, when an IP packet passes through the MPLS network, the IP TTL is decremented by 1 to the MPLS TTL field on the ingress node.B . The TTL of the MPLS label has the...

November 16, 2021 No Comments READ MORE +

Which of the following options may affect the establishment of IBGP neighbors? (Multiple Choice)

Which of the following options may affect the establishment of IBGP neighbors? (Multiple Choice)A . Authentication is unsuccessfulB . The BGP protocol version is inconsistentC . IBGP-Multi-hop is not configuredD . IGP routing is unreachableView AnswerAnswer: ABD

November 16, 2021 No Comments READ MORE +

Router-LSA of OSPFv3 is generated by each router. It describes the interface address and cost of each link of the router, and also contains the router ID of the neighboring router.

Router-LSA of OSPFv3 is generated by each router. It describes the interface address and cost of each link of the router, and also contains the router ID of the neighboring router.A . TrueB . FalseView AnswerAnswer: B

November 15, 2021 No Comments READ MORE +

Which of the following technologies use tunneling technology to communicate between IPv6 addresses? (Multiple Choice)

Which of the following technologies use tunneling technology to communicate between IPv6 addresses? (Multiple Choice)A . Dual StackB . 6to4C . ISATAPD . NAT64View AnswerAnswer: BC

November 15, 2021 No Comments READ MORE +

The following statements about the ISIS protocol route aggregation, which are correct?

The following statements about the ISIS protocol route aggregation, which are correct?A . Route aggregation can be configured and validated on all types of routers.B . Route aggregation can only be configured on the level-1 router to take effect.C . Route aggregation can only be configured on the level-2 router...

November 15, 2021 No Comments READ MORE +