The following is a part of the NETCONF protocol message, <rpc xmlns="urn:ietf:params:xml:ns:netc nf:base:1.0" message-id="1024">Where is it located in the NETCONF architecture layer?

The following is a part of the NETCONF protocol message, <rpc xmlns="urn:ietf:params:xml:ns:netc nf:base:1.0" message-id="1024">Where is it located in the NETCONF architecture layer?A . Transport layerB . Message layerC . Content LayerD . Operation layerView AnswerAnswer: B

August 15, 2022 No Comments READ MORE +

BGP-LS (BGP Link State) carries information such as links, nodes and topology prefixes.

BGP-LS (BGP Link State) carries information such as links, nodes and topology prefixes.A . TRUEB . FALSEView AnswerAnswer: A

August 14, 2022 No Comments READ MORE +

There are multiple protocols that can change or obtain network device data. Which of the following protocols cannot be used to change network device data?

There are multiple protocols that can change or obtain network device data. Which of the following protocols cannot be used to change network device data?A . SNMPB . NETCONFC . RESTC NFD . IPsecView AnswerAnswer: D

August 13, 2022 No Comments READ MORE +

When the client calls the iMaster NCE-Campus login authentication RESTful interface, the method used is POST, and the request message body format is {"userName": "xxx", "password": "xxx"}

When the client calls the iMaster NCE-Campus login authentication RESTful interface, the method used is POST, and the request message body format is {"userName": "xxx", "password": "xxx"}A . TRUEB . FALSEView AnswerAnswer: B

August 13, 2022 No Comments READ MORE +

BIER, as a new forwarding technology, adopts the basic IGP routing protocol and unicast routing forwarding mechanism, so that there is no need to run IGMP between the multicast receiver and the multicast router.

BIER, as a new forwarding technology, adopts the basic IGP routing protocol and unicast routing forwarding mechanism, so that there is no need to run IGMP between the multicast receiver and the multicast router.A . TRUEB . FALSEView AnswerAnswer: B

August 13, 2022 No Comments READ MORE +

Switch stacking and cross-device link aggregation can be deployed to achieve link reliability in small and medium-sized campus scenarios.

Switch stacking and cross-device link aggregation can be deployed to achieve link reliability in small and medium-sized campus scenarios.A . TRUEB . FALSEView AnswerAnswer: A

August 12, 2022 No Comments READ MORE +

The OSPF-based SR-MPLS function is enabled on all routers in a network. The SREB of each router is shown in the figure. By default, when R3 forwards a packet whose destination address is 10.0.4.4, which of the following MFLS labels is carried item?

The OSPF-based SR-MPLS function is enabled on all routers in a network. The SREB of each router is shown in the figure. By default, when R3 forwards a packet whose destination address is 10.0.4.4, which of the following MFLS labels is carried item? A . 3B . 100C . 40100D...

August 12, 2022 No Comments READ MORE +

When MPLS is deployed in the network and the network layer protocol is IP, the route corresponding to the FEC must exist in the IP routing table of the LSR, otherwise the label forwarding entry of the FEC will not take effect.

When MPLS is deployed in the network and the network layer protocol is IP, the route corresponding to the FEC must exist in the IP routing table of the LSR, otherwise the label forwarding entry of the FEC will not take effect.A . TRUEB . FALSEView AnswerAnswer: A

August 11, 2022 No Comments READ MORE +

Which of the following tools does a BGP router need to use for this purpose?

The RF function of the BGP protocol can control the routing entries sent by the neighbors. Which of the following tools does a BGP router need to use for this purpose?A . Filter-PolicyB . IP Prefix ListC . ACLD . Route-PolicyView AnswerAnswer: B

August 11, 2022 No Comments READ MORE +

Which of the following descriptions about authentication event authorization is wrong?

When the user encounters different events during the authentication process, the user is in an unsuccessful authentication state. At this time, you can configure the authentication event authorization to meet the needs of these users to access specific network resources. Which of the following descriptions about authentication event authorization is...

August 11, 2022 No Comments READ MORE +