Loading questions...
Updated
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Support Examcademy
Your support keeps this platform running. Become a Supporter to remove all ads and unlock exclusive study tools.
Study without distractions
Supporters get zero ads, spaced-repetition Learn Mode, timed Exam Mode, and AI-powered explanations from AstroTutor.
When troubleshooting the EBGP neighbor relationship, you found that two directly connected devices use Loopback ports to establish a connection, so execute display current-configuration configuration bgp to view the configuration of peer ebgp-max-hop hop-count. Which of the following statements is correct?
An enterprise purchased the leased lines of two operators. In order to optimize the route, the enterprise used the 6GP protocol to learn routing entries of the two operators. However, the company found that after such a configuration, the traffic of the export routing increased greatly. After the network engineering investigation, it was found that the traffic of the two operators was passed to each other through the company's export router.

Therefore, the company intends to use routing strategies to prevent the traffic between different operators from passing each other. Is the configuration in the figure correct?
Which of the following statements about IS-IS (IPv6) is correct? (Choose three.)
In OSPF, ABR will convert all Type 7 LSAs in the NSSA area into Type 5 LSAs.
Which of the following regarding the configuration description is wrong?

Regarding MP-BGP, which of the following description is incorrect?
Regarding the cause of the dual-master failure of the VRRP backup group, which of the following is the most unlikely?
Configure under a certain interface: isis timer hello 5 leve1-2, which of the following statements is correct?
Which of the following is wrong about DHCP Snooping?
Regarding the IPSG, which of the following statement is incorrect?
As shown in the figure, Site1 and Site2 need to achieve mutual access through the operator's BGP/MPLS IPVPN. It is known that the public network tunnel between PE1 and PE2 has been established (the label information is shown in the figure), and PF1 has advertised the 192.168.1.0/24 network segment route in Site1 to PE2 through the MP.JIBGP neighbor relationship, and the route learning is normal.

When capturing the data that Site2 visits the 192.168.1.0/24 of Site1 between P and PE1, what should be the outermost label?
The network administrator A wants to use ACL to match only the four routing entries 1, 3.5, and 7 in the figure. How many ACL rules does the network administrator A need to configure at least?

As shown in the figure, Client1 and Client2 act as clients of RR1 and RR2 at the same time, RR1 and RR2 are in the same Cluster, and R has introduced 10 routes. Assume that the BCP configuration is correct.

The neighbor relationship has been established. How many routing entries are there in the BGP routing table of Client2 ultimately?
Part of the configuration of R1 is as follows. Which statement about OSPF on R1 is correct?

As shown in the figure, all interfaces of the router enable OSPF, among which R4 and R5 can establish OSPF virtual connections.

What is the flooding scope in OSPFv3 for the LSA in the entire autonomous system?
According to this picture, we can judge:

The routing attributes of the three routing entries are shown in the figure. Assuming that the next hop of the three routing entries are all reachable, when the three routing entries arrive at the BP router in sequence, by default, BGP will finally select one route entry?

IPSG is a source IP address filtering technology based on Layer 3 interfaces. It prevents malicious hosts from forging authorized hosts' IP addresses to access authorized network resources.
Which of the following will not cause the VRRP backup group to oscillate?
In order to speed up the perception of link failures in the IS-IS network, IS-IS can be linked with BFD.
Which of the following are not included in the security protection actions that a secure MAC address can perform?
An engineer uses two routers to test IPv6 services, and simulates the interconnection between the headquarters and branches by running BGP4+. As shown in the figure, an engineer captures the packet to view the update message sent by R1.

Regarding the description of the message information, which of the following statements is correct?
As shown in the figure, a certain park has deployed IPv6 for service testing, and there are 4 routers in the network. Run OSPFv3 to realize network interconnection.

Regarding the LSA generated by the OSPFv3 network, which of the following statements is wrong?
A network engineer outputs the following information when troubleshooting OSPF. Based on this, determine which reason causes the adjacency relationship to fail to be established normally?
