Which of the following does not belong to the scope of dynamic data collection on the live network before cutover?

Which of the following does not belong to the scope of dynamic data collection on the live network before cutover?A . Routing Protocol StatusB . ARP entryC . Port StatusD . SNMP versionView AnswerAnswer: C

August 6, 2022 No Comments READ MORE +

According to different network conditions, Layer 2 Portal authentication or Layer 3 Portal1 authentication can be deployed in the network. Which of the following descriptions is wrong?

According to different network conditions, Layer 2 Portal authentication or Layer 3 Portal1 authentication can be deployed in the network. Which of the following descriptions is wrong?A . When there is a Layer 2 network between the client and the access device, that is, the client and the access device...

August 6, 2022 No Comments READ MORE +

Among them, SR-MPLS Policy is optimized by which of the following parameters?

SR-MPLS Policy can use BGP extension to transmit tunnel information, as shown in the figure. Among them, SR-MPLS Policy is optimized by which of the following parameters?A . PriorityB . PreferenceC . WeightD . Binding SIDView AnswerAnswer: C

August 6, 2022 No Comments READ MORE +

Which of the following regular expressions can match only the BGP route entries that pass through AS300 and then AS200?

Which of the following regular expressions can match only the BGP route entries that pass through AS300 and then AS200?A . ^200|^300B . 200$|300$C . _200 (200 300) _D . _200[200 300]_View AnswerAnswer: C

August 6, 2022 No Comments READ MORE +

Which of the following descriptions about equal-cost routing in an IS-IS network is wrong?

When there are multiple redundant links in the IS-IS network, there may be multiple equal-cost routes. Which of the following descriptions about equal-cost routing in an IS-IS network is wrong?A . When the number of equal-cost routes in the network is greater than the number configured by the command, and...

August 5, 2022 No Comments READ MORE +

Which of the following statements about choosing an authentication point location in a network is incorrect?

Which of the following statements about choosing an authentication point location in a network is incorrect?A . Deploying authentication at the access layer of the network is conducive to fine-grained management of permissions and high network securityB . After the user authentication point is moved from the access layer to...

August 5, 2022 No Comments READ MORE +

NVE is a network entity that realizes the function of network virtualization, and can only be a hardware switch.

NVE is a network entity that realizes the function of network virtualization, and can only be a hardware switch.A . TRUEB . FALSEView AnswerAnswer: B

August 5, 2022 No Comments READ MORE +

In order to speed up the sensing speed of link failure in IS-IS network, IS-IS can be linked with BFD.

In order to speed up the sensing speed of link failure in IS-IS network, IS-IS can be linked with BFD.A . TRUEB . FALSEView AnswerAnswer: A

August 4, 2022 No Comments READ MORE +

In the campus VXLAN network, which of the following equipment is used to connect the Fabric and the external network of the Fabric?

In the campus VXLAN network, which of the following equipment is used to connect the Fabric and the external network of the Fabric?A . ExtendedB . BrderC . TransparentD . EdgeView AnswerAnswer: B

August 4, 2022 No Comments READ MORE +

Which of the following descriptions about the difference between SPFv2 and SPFv3 are correct?

Which of the following descriptions about the difference between SPFv2 and SPFv3 are correct?A . Both SPFv2 and SPFv3 support interface authentication, and OSPFv3 authentication is still implemented based on the fields in the SPF packet headerB . SPFv3 is similar to SPFv2 and uses the multicast address as the...

August 4, 2022 No Comments READ MORE +