Which of the following statements about VXLAN messages is correct? (Multiple choice) A . The outer destination IP address is the IP address of the remote VTEP of the VXLAN tunnel. B . The source UDP port number is 4789 C . Destination UDP port number is 4789 D . VNI has 24 bits and is used to distinguish VLAN segments.
The following statements about the VRRP protocol which are correct? A . Both VRRPv2 and VRRPv3 support authentication. B . VRRPv3 does not support authentication, while VRRPv2 supports authentication. C . VRRPv2 is only applicable to IPv4 networks, and VRRPv3 is only applicable to IPv6 networks. D . The owner of the Mater IP address has VRRP priority of 255, so the priority range that can be configured is 0-254.
Which of the following options is correct for the assertion mechanism? A . The size of the IP address will not be used as a condition for election during the election of the winner. B . In the assertion mechanism, winner is responsible for forwarding multicast data to the broadcast network segment. C . The assertion mechanism is used for the election of the D E . In the assertion mechanism, loser shut down the interface connected to the broadcast network.
The following is about the LDP protocol session establishment process, which is the correct description? (Multiple choice) A . After the TCP connection is successfully established, the active party sends an initialization message to negotiate the parameters related to the LDP session. B . The party with the larger transmission address acts as the active party and initiates the establishment of TCP connection. C . The Hello message discovered by the LDP neighbor uses TCP packets. The destination address is the multicast address 184.108.40.206. D . After both parties receive the Keepalive message from the peer, the LDP session is established successfully.
Which of the following options may affect the establishment of IBGP neighbors? (Multiple Choice) A . Authentication is unsuccessful B . The BGP protocol version is inconsistent C . IBGP-Multi-hop is not configured D . IGP routing is unreachable
The following statement about the security confederation SA in IPsec, which is wrong? A . The SA is uniquely identified by a triplet that includes the Security Parameter Index (SP), the source IP address and the security protocol number used (AH or ESP). B . Use display IPsec to view information about encryption algorithms, traffic, and other information used between another IPsec peer. C . IPsec only supports the use of symmetric encryption algorithms to encrypt data. D . There must be two-way SA between IPsec peers to establish an IPsec VPN connection.
The following are the statements about LDP reliability, which one is wrong? A . LDP FRR can also be used to generate an LSP for the label mapping from the non-optimal next hop. And it can be as a backup of the primary LSP to establish the transfer entries. B . The association between the LDP and the IGP requires the IGP to suppress the advertisement of the route and ensure that the LDP path is consistent with the IGP path. C . The manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish a backup LS E . LDP GR Graceful Restart uses the feature that the MPLS forwarding plane is separated from the control plane. The device does not interrupt when the protocol is restarted or the active/standby switchover is performed.