The second layer switch belongs to the data link layer device, which can identify the mac address information in the data frame, forward data according to the mac address, and record these mac addresses and corresponding port information in its own mac address table.

The second layer switch belongs to the data link layer device, which can identify the mac address information in the data frame, forward data according to the mac address, and record these mac addresses and corresponding port information in its own mac address table.A . TrueB . FalseView AnswerAnswer: A

October 5, 2021 No Comments READ MORE +

Regarding the transport layer protocol, which of the following statements are correct? (Multiple Choice)

Regarding the transport layer protocol, which of the following statements are correct? (Multiple Choice)A . The establishment of a TCP connection is a three-way handshake process, and the termination of a TCP connection requires a four-way handshakeB . UDP uses the SYN and ACK flags to request and confirm the...

October 5, 2021 No Comments READ MORE +

The network administrator configures as shown in the figure on the Huawei router RTA, if a user needs to be authenticated in the authentication domain "huawei", which of the following descriptions is correct?

The network administrator configures as shown in the figure on the Huawei router RTA, if a user needs to be authenticated in the authentication domain "huawei", which of the following descriptions is correct? [RTA] aaa [RTA-aaa] domain huawei [RTA-aaa-domain huawei] authentication-scheme au1 [RTA-aaa domain-huawei] authentication-scheme au2A . "authentication-scheme au1" authentication...

October 4, 2021 No Comments READ MORE +

What is the number range of advanced ACL?

What is the number range of advanced ACL?A . 2000-2999B . 4000-4999C . 6000-6031D . 3000-3999View AnswerAnswer: D

October 3, 2021 No Comments READ MORE +

Dynamic routing protocols can automatically adapt to changes in network topology.

Dynamic routing protocols can automatically adapt to changes in network topology.A . TrueB . FalseView AnswerAnswer: A

October 2, 2021 No Comments READ MORE +

In the configuration BPDU sent by the switch, which bridge ID is unlikely to appear?

In the configuration BPDU sent by the switch, which bridge ID is unlikely to appear?A . 8192 00-01-02-03-04-CCB . 2048 00-01-02-03-04-CCC . 4096 00-01-02-03-04-CCD . 0 00-01-02-03-04-CCView AnswerAnswer: B

October 2, 2021 No Comments READ MORE +

At what frequency does the IEEE 802.11n standard support to work? (Multiple Choice)

At what frequency does the IEEE 802.11n standard support to work? (Multiple Choice)A . 6GHzB . 2.5GHzC . 2.4GHzD . 5GHzView AnswerAnswer: CD

October 1, 2021 No Comments READ MORE +

If the configured ACL rule has an inclusion relationship, it should be noted that the rule number of the strict condition needs to be sorted first, and the rule number of the loose condition needs to be sorted later, to prevent the packet from hitting the loose condition rule and stop continuing to match, thus make it impossible to hit the strict conditions of the rules.

If the configured ACL rule has an inclusion relationship, it should be noted that the rule number of the strict condition needs to be sorted first, and the rule number of the loose condition needs to be sorted later, to prevent the packet from hitting the loose condition rule and...

October 1, 2021 No Comments READ MORE +

What is the number range of Layer 2 ACL?

What is the number range of Layer 2 ACL?A . 4000-4999B . 2000-2999C . 6000-6031D . 3000-3999View AnswerAnswer: A

September 30, 2021 No Comments READ MORE +

Which of the following statements is incorrect?

As shown in the figure, there are three data packets captured by the administrator on the network. Which of the following statements is incorrect? A . None of these three data packets contain application layer dataB . These three data packets represent the three-way handshake process of TCPC . The...

September 30, 2021 No Comments READ MORE +