CMPv6 uses the Type field to identify the message type, and according to the value of the type field, we can divide the ICMPv6 message into two categories, one is the error message and the other is the information message

CMPv6 uses the Type field to identify the message type, and according to the value of the type field, we can divide the ICMPv6 message into two categories, one is the error message and the other is the information messageA . TrueB . FalseView AnswerAnswer: A

May 16, 2022 No Comments READ MORE +

After BGP introduces routes for other protocols, the next hop in the BGP routing table is consistent with the next hop of the introduced routing protocol

After BGP introduces routes for other protocols, the next hop in the BGP routing table is consistent with the next hop of the introduced routing protocolA . TrueB . FalseView AnswerAnswer: B

May 16, 2022 No Comments READ MORE +

The following description of the characteristics of multi-instance CE is?

The following description of the characteristics of multi-instance CE is?A . Since the MCE device is already bound to the VPN, there is no need to bind the VPN on the PE connected to the MCE deviceB . The MCE device can determine the source of the routing information according...

May 15, 2022 No Comments READ MORE +

When a Layer 3 switch sends IP packets originating from one VLAN to another LAN, which field in the following options is overridden? (Single choice questions).

When a Layer 3 switch sends IP packets originating from one VLAN to another LAN, which field in the following options is overridden? (Single choice questions).A . Three layers of TTLB . Layer 3 destination addressC . Layer 3 source addressD . Layer 3 Transport ProtocolE . Two-tier TTLView AnswerAnswer:...

May 15, 2022 No Comments READ MORE +

The following description of the link state protocol is plausible?

The following description of the link state protocol is plausible?A . CPU utilization is high and loops are easy to generateB . Slow convergence and low CPU utilizationC . Fast convergence and low CPU utilizationD . Fast convergence and high CPU utilizationView AnswerAnswer: D

May 15, 2022 No Comments READ MORE +

If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?

If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?A . PIM routers with long interface masks are elected dr.B . Compare the...

May 15, 2022 No Comments READ MORE +

A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1. 1. 10, so what is the virtual MAC address?

A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1. 1. 10, so what is the virtual MAC address?A . O0-00-5E-00-01-64B . 01-00-5E-00-01-03C . 01-00-5E-00-01-54D . 00-00-5E-00-01-03View AnswerAnswer: D

May 15, 2022 No Comments READ MORE +

SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data

SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer dataA . TRUEB . FALSEView AnswerAnswer: A

May 14, 2022 No Comments READ MORE +

In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is

In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement isA . The root protection feature is enabled for the specified port, and its port role can only remain as the specified portB . When the anti-TC-BPDU packet attack feature is enabled, the number of...

May 14, 2022 No Comments READ MORE +

The DHCP protocol assigns to clients―some TCPIP-related parameter information―in the process DHCP defines a variety of messages that are encapsulated at the transport layer: (sortic).

The DHCP protocol assigns to clients―some TCPIP-related parameter information―in the process DHCP defines a variety of messages that are encapsulated at the transport layer: (sortic).A . PPP packageB . IP encapsulationC . TCP EncapsulationD . UDP EncapsulationView AnswerAnswer: D

May 13, 2022 No Comments READ MORE +