In OSPF, an ABR translates all Type 7 LSAs in a Not-So-Stubby Area (NSSA) into Type 5 LSAs.

In OSPF, an ABR translates all Type 7 LSAs in a Not-So-Stubby Area (NSSA) into Type 5 LSAs.A . True B. FalseView AnswerAnswer: A

July 5, 2023 No Comments READ MORE +

Which of the following is the drop probability of packets exceeding the upper threshold in WRED?

Which of the following is the drop probability of packets exceeding the upper threshold in WRED?A . 0.2 B. 0.5 C. 0.8 D. 1View AnswerAnswer: D

July 5, 2023 No Comments READ MORE +

Which of the following statements about Portal authentication is incorrect?

Portal authentication, also known as web authentication, is used to authenticate user identities on a web authentication page. Which of the following statements about Portal authentication is incorrect?A . Before Portal authentication, the authentication client must obtain the IP address and be able to communicate with the Portal server. B....

July 5, 2023 No Comments READ MORE +

In Huawei SD-WAN Solution, atter a CPE goes online, it automatically selects an RR without the help of iMaster NCE-WAN.

In Huawei SD-WAN Solution, atter a CPE goes online, it automatically selects an RR without the help of iMaster NCE-WAN.A . True B. FalseView AnswerAnswer: B

July 5, 2023 No Comments READ MORE +

Which of the following symmetric encryption algorithms can be used by both the SSH server and client?

In the SSH algorithm negotiation phase, the SSH server and client exchange the list of algorithms that they support. The list of symmetric encryption algorithms of the SSH server is as follows: aes256-ctr, aes192-ctr, aes128-ctr, and aes256-cbc. The list of symmetric encryption algorithms of the SSH client is as follows:...

July 4, 2023 No Comments READ MORE +

YANG, deriving from NETCONF, is not only applicable to NETCONF. Currently, both the YANG modeling language and YANG file have been unified.

YANG, deriving from NETCONF, is not only applicable to NETCONF. Currently, both the YANG modeling language and YANG file have been unified.A . True B. FalseView AnswerAnswer: A

July 4, 2023 No Comments READ MORE +

As shown in the following figure, by using a route-policy changes the MED value of the route sent from R1 to R2, the network administrator can control the traffic through which path leaves AS 100.

As shown in the following figure, by using a route-policy changes the MED value of the route sent from R1 to R2, the network administrator can control the traffic through which path leaves AS 100.A . True B. FalseView AnswerAnswer: B

July 4, 2023 No Comments READ MORE +

For the same MAC address, a manually configured MAC entry has a higher priority than an automatically generated MAC entry.

For the same MAC address, a manually configured MAC entry has a higher priority than an automatically generated MAC entry.A . True B. FalseView AnswerAnswer: A

July 4, 2023 No Comments READ MORE +

When an SSH client logs in to the SSH server that is configured only with user name and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).

When an SSH client logs in to the SSH server that is configured only with user name and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).A . True B. FalseView AnswerAnswer: B

July 4, 2023 No Comments READ MORE +

An SRv6 Policy can be either statically configured on a device, or be delivered to a device after being dynamically generated by the controller.

An SRv6 Policy can be either statically configured on a device, or be delivered to a device after being dynamically generated by the controller.A . True B. FalseView AnswerAnswer: A

July 3, 2023 No Comments READ MORE +