When troubleshooting the EBGP neighbor relationship, you found that two directly connected devices use Loopback ports to establish a connection, so execute display current-configuration configuration bgp to view the configuration of peer ebgp-max-hop hop-count. Which of the following statements is correct?
An enterprise purchased the leased lines of two operators. In order to optimize the route, the enterprise used the 6GP protocol to learn routing entries of the two operators. However, the company found that after such a configuration, the traffic of the export routing increased greatly. After the network engineering investigation, it was found that the traffic of the two operators was passed to each other through the company's export router.
Therefore, the company intends to use routing strategies to prevent the traffic between different operators from passing each other. Is the configuration in the figure correct?
ATRUE
BFALSE
Which of the following statements about IS-IS (IPv6) is correct? (Choose three.)
ATo support the processing and calculation of IPv6 routing, IS-IS added NLPID to 129 TLV
BIS-IS working at the data link layer only needs to add a new TLV to support Pv6
CTo support the processing and calculation of IPv6 routes, IS-IS has added TLV232236
DBy default, IS-IS enables the multi-topology feature
In OSPF, ABR will convert all Type 7 LSAs in the NSSA area into Type 5 LSAs.
ATRUE
BFALSE
Which of the following regarding the configuration description is wrong?
AIf the DHCP request message received by the GigabitEthemnet0/0/1 interface does not contain the SutOption information of Option82, the device will generate Option82 and insert it into the message
BEnabling the DHCP Snooping configuration can be used to prevent DHCP Server counterfeiters from attacking
CConfigure GigabitEthernet0/0/1 as a trusted interface
DEnabling the DHCP Snooping configuration can be used to prevent ARP spoofing attacks
Question 6
Underlying Cloud Technologies
0
Question 7
Underlying Cloud Technologies
Question 8
Underlying Cloud Technologies
Question 9
Underlying Cloud Technologies
Question 10
Underlying Cloud Technologies
Question 11
Underlying Cloud Technologies
Question 12
Industry Best Practices of Huawei Cloud
Question 13
Underlying Cloud Technologies
Question 14
Underlying Cloud Technologies
Question 15
Underlying Cloud Technologies
Question 16
Underlying Cloud Technologies
Question 17
Underlying Cloud Technologies
Question 18
Underlying Cloud Technologies
Question 19
Underlying Cloud Technologies
Question 20
Cloud O&M and Optimization
Question 21
Underlying Cloud Technologies
Question 22
Underlying Cloud Technologies
Question 23
Underlying Cloud Technologies
Question 24
Underlying Cloud Technologies
Question 25
Underlying Cloud Technologies
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Regarding MP-BGP, which of the following description is incorrect?
AWhen the PE and CE exchange routes through BGP, you need to create a BGP process for each VPN instance on the CE
BMP-BGP's message type and VPNv4 routing policy are the same as BGP-4
CMP-BGP needs to assign private network labels to VPNv4 routes
DMP-BGP advertises VPNv4 routes through two attributes: MP_REACH_NLRI and MP_UREACH_NLRI
Regarding the cause of the dual-master failure of the VRRP backup group, which of the following is the most unlikely?
AThe link that transmits the VRRP notification message is faulty
BThe low-priority VRRP backup group discards the received VRRP notification packets as illegal packets
CThe VRRP backup group IDs on both ends are different
DMaster device sends 1 notification message per second
Configure under a certain interface: isis timer hello 5 leve1-2, which of the following statements is correct?
AThe interval for sending Level-2 hello packets on this interface is 5s
BThe hello packet sending interval of Level-1 and Leval-2 of this interface is 3s.
CThe interval for sending Level-2 CSNP packets of this interface is 5s
DThe interval for sending Level-1 hello packets on this interface is 5s
Which of the following is wrong about DHCP Snooping?
ADHCP Snooping can prevent illegal attacks by setting trusted ports (all interfaces are untrusted by default)
BEnable DHCP Snooping globally, without any post parameters, the device only processes DHCPv4 messages by default
CEnable the DHCP Snooping function in the interface view, then all the DHCP message command functions under the interface will take effect
DEnable the DHCP Snooping function in the VLAN view, and the command function of DHCP messages belonging to the VLAN received by all interfaces of the device will take effect
Regarding the IPSG, which of the following statement is incorrect?
AIPSG can prevent IP address spoofing attacks
BIPSG is a source IP address filtering technology based on the three-layer interface
CIPSG can turn on the IP packet inspection and alarm function, and cooperate with the network management to perform alarms
DIPSG can prevent the host from changing the IP address privately
As shown in the figure, Site1 and Site2 need to achieve mutual access through the operator's BGP/MPLS IPVPN. It is known that the public network tunnel between PE1 and PE2 has been established (the label information is shown in the figure), and PF1 has advertised the 192.168.1.0/24 network segment route in Site1 to PE2 through the MP.JIBGP neighbor relationship, and the route learning is normal.
When capturing the data that Site2 visits the 192.168.1.0/24 of Site1 between P and PE1, what should be the outermost label?
A6661
B3
C6662
D8888
The network administrator A wants to use ACL to match only the four routing entries 1, 3.5, and 7 in the figure. How many ACL rules does the network administrator A need to configure at least?
A2
B1
C4
D3
As shown in the figure, Client1 and Client2 act as clients of RR1 and RR2 at the same time, RR1 and RR2 are in the same Cluster, and R has introduced 10 routes. Assume that the BCP configuration is correct.
The neighbor relationship has been established. How many routing entries are there in the BGP routing table of Client2 ultimately?
A10
B20
C0
D15
Part of the configuration of R1 is as follows. Which statement about OSPF on R1 is correct?
AThe device type of R1 is Level-2
BThe device type of R1 cannot be determined
CThe device type of R1 is Leve1-1
DThe device type of R1 is Level-1-2
As shown in the figure, all interfaces of the router enable OSPF, among which R4 and R5 can establish OSPF virtual connections.
ATRUE
BFALSE
What is the flooding scope in OSPFv3 for the LSA in the entire autonomous system?
ALink-LSA
BAs-external-LSA
CInter-Area-Prefix-LSA
DIntra-Area-Prefix-LSA
According to this picture, we can judge:
AThe system ID of R1 is ee8c.a0c2.bafl
BR1 has both leve1-1 and level-1-2 link state information
CR1 only has link state information for leve1-2
DIn the leve1-2 network, there are a total of 8 routers
The routing attributes of the three routing entries are shown in the figure. Assuming that the next hop of the three routing entries are all reachable, when the three routing entries arrive at the BP router in sequence, by default, BGP will finally select one route entry?
ARoute B
BRoute C
CRoute A
IPSG is a source IP address filtering technology based on Layer 3 interfaces. It prevents malicious hosts from forging authorized hosts' IP addresses to access authorized network resources.
ATRUE
BFALSE
Which of the following will not cause the VRRP backup group to oscillate?
AThe VRRP backup group preemption delay configuration on both ends is inconsistent
BBackup device interface packet loss
CThe time interval of notification messages is too small
DThe link that transmits VRRP notification packets flaps
In order to speed up the perception of link failures in the IS-IS network, IS-IS can be linked with BFD.
ATRUE
BFALSE
Which of the following are not included in the security protection actions that a secure MAC address can perform?
AProtect
BRestrict
CShutdown
DRemark
An engineer uses two routers to test IPv6 services, and simulates the interconnection between the headquarters and branches by running BGP4+. As shown in the figure, an engineer captures the packet to view the update message sent by R1.
Regarding the description of the message information, which of the following statements is correct?
AThe next-hop address of the route described in this message is: 2001:db8::2345:1.:1
BThe message describes the currently revoked IPv6 route
CThe routing address prefix and its prefix length described in this message are: 2001:db8:2345:1::1/128/
DThe route described in the message may be imported through import
As shown in the figure, a certain park has deployed IPv6 for service testing, and there are 4 routers in the network. Run OSPFv3 to realize network interconnection.
Regarding the LSA generated by the OSPFv3 network, which of the following statements is wrong?
AR1 itself will generate Router-LSA to describe device interface information, and will receive Router-LSA generated by R2 and R3 at the same time
BThere is a Network LSA generated by R3 in the LSDB of R1, indicating that R3 may be the DR of this link
CR1 will receive the two Link-LSAs generated by R2, describing the two links information connected to The safer, easier way to help you pass any IT exams. 4 / 86 R2 respectively
DAs an ABR, R2 will generate Inter-Area-Prefix-LSA describing the IPv6 address prefix of Area 1, and advertise it to R1 and R3
A network engineer outputs the following information when troubleshooting OSPF. Based on this, determine which reason causes the adjacency relationship to fail to be established normally?
AAuthentication password is not-consistent
BRegional type is not-consistent
CThe interval for sending Hello messages is not-consistent
DThe IP address mask of the interface is not-consistent