The following statements about the VRRP protocol which are correct?

The following statements about the VRRP protocol which are correct?
A . Both VRRPv2 and VRRPv3 support authentication.
B . VRRPv3 does not support authentication, while VRRPv2 supports authentication.
C . VRRPv2 is only applicable to IPv4 networks, and VRRPv3 is only applicable to IPv6 networks.
D . The owner of the Mater IP address has VRRP priority of 255, so the priority range that can be configured is 0-254.

Answer: B

Which of the following options is correct for the assertion mechanism?

Which of the following options is correct for the assertion mechanism?
A . The size of the IP address will not be used as a condition for election during the election of the winner.
B . In the assertion mechanism, winner is responsible for forwarding multicast data to the broadcast network segment.
C . The assertion mechanism is used for the election of the D
E . In the assertion mechanism, loser shut down the interface connected to the broadcast network.

Answer: B

The following is about the LDP protocol session establishment process, which is the correct description? (Multiple choice)

The following is about the LDP protocol session establishment process, which is the correct description? (Multiple choice)
A . After the TCP connection is successfully established, the active party sends an initialization message to negotiate the parameters related to the LDP session.
B . The party with the larger transmission address acts as the active party and initiates the establishment of TCP connection.
C . The Hello message discovered by the LDP neighbor uses TCP packets. The destination address is the multicast address 224.0.0.2.
D . After both parties receive the Keepalive message from the peer, the LDP session is established successfully.

Answer: ABD

Which ACL does the router HW1 need to configure to enable LAN-to-LAN traffic to pass through the encrypted VPN tunnel?

Router HW1 and router HW2 are connected to network A and network B respectively. As shown below, if you want to establish an IPsec VPN between router HW1 and router HW2.

Which ACL does the router HW1 need to configure to enable LAN-to-LAN traffic to pass through the encrypted VPN tunnel?

A . rule permit ip source 192.168.1.10 destination 192.168.1.2 0
B . rule permit ip source 10.1.1.0 0.0.0.255 destination 192.168.1.2 0
C . rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
D . rule permit ip source 192.168.1.10 destination 10.1.2.0 0.0.0.255
E . rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255

Answer: C

The following statement about the security confederation SA in IPsec, which is wrong?

The following statement about the security confederation SA in IPsec, which is wrong?
A . The SA is uniquely identified by a triplet that includes the Security Parameter Index (SP), the source IP address and the security protocol number used (AH or ESP).
B . Use display IPsec to view information about encryption algorithms, traffic, and other information used between another IPsec peer.
C . IPsec only supports the use of symmetric encryption algorithms to encrypt data.
D . There must be two-way SA between IPsec peers to establish an IPsec VPN connection.

Answer: A

The following are the statements about LDP reliability, which one is wrong?

The following are the statements about LDP reliability, which one is wrong?
A . LDP FRR can also be used to generate an LSP for the label mapping from the non-optimal next hop. And it can be as a backup of the primary LSP to establish the transfer entries.
B . The association between the LDP and the IGP requires the IGP to suppress the advertisement of the route and ensure that the LDP path is consistent with the IGP path.
C . The manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish a backup LS
E . LDP GR Graceful Restart uses the feature that the MPLS forwarding plane is separated from the control plane. The device does not interrupt when the protocol is restarted or the active/standby switchover is performed.

Answer: C