By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.
ATrue
BFalse
VXLAN identifies tenants using VNIs, which are 24 bits long. A tenant can have one or more VNIs, and VXLAN supports a maximum of 12 million tenants.
ATrue
BFalse
In the SSH algorithm negotiation phase, the SSH server and client exchange the list of algorithms that hey support. The list of symmetric encryption algorithms of the SSH server is as follows: aes256-ctr, aes192-ctr, aes128-ctr, and aes256-cbc. The list of symmetric encryption algorithms of the SSH client is as follows: aes128-ctr, aes192-ctr, aes256-ctr, and aes256-cbc. Which of the following symmetric encryption algorithms can be used by both the SSH server and client?
Aaes256-ctr
Baes192-ctr
Caes128-ctr
Daes256-cbc
As shown in the figure, PE1 and PE2 exchange private network route information with their respective CEs through OSPF, and the same domain ID is configured on PE1 and PE2. Which of the following LSA types may be transmitted to CE2 when PE2 imports BGP routes to the OSPF process?
AType 1 LSA
BType 3 LSA
CType 5 LSA
DType 7 LSA
Question 6
高级路由交换技术
0
Question 7
高级路由交换技术
Question 8
网络自动化
Question 9
园区网络规划与部署
Question 10
高级路由交换技术
Question 11
高级路由交换技术
Question 12
高级路由交换技术
Question 13
高级路由交换技术
Question 14
高级路由交换技术
Question 15
网络自动化
Question 16
园区网络规划与部署
Question 17
网络自动化
Question 18
高级路由交换技术
Question 19
广域承载网络规划与部署
Question 20
高级路由交换技术
Question 21
高级路由交换技术
Question 22
高级路由交换技术
Question 23
高级路由交换技术
Question 24
广域承载网络规划与部署
Question 25
高级路由交换技术
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.
ATrue
BFalse
On a medium-sized network configured with BGP, two RRs are typically deployed to improved BGP RR reliability. Typically, the cluster IDs of the two RRs are set as the same. Which of the following is the reason for that?
ATo prevent loops.
BTo prevent sub-optimal routes.
CTo prevent memory insufficiency caused by receiving too many routes on RRs.
DTo prevent memory insufficiency caused by receiving too many routes on clients.
Which of the following is the default port used by iMaster NCE-Campus northbound open APIs?
A18008
B18006
C18002
D18000
On the network shown in the following figure, 802.1X authentication is deployed on GE0/0/1 of SW2. Which of the following statements are correct?
AWhen MAC address-based access control is used, 802.1X clients A and B must be authenticated separately before they can obtain corresponding network access permissions.
BWhen interface-based access control is used, 802.1X client B can use network resources without being authenticated if 802.1X client A is successfully authenticated.
CAssume that SW2 uses MAC address-based access control mode and 802.1X client A passes authentication first. If 802.1X client A goes offline first, then 802.1X client B will still have the corresponding network access permissions because the interface status remains unchanged.
DAssume that SW2 uses the interface-based access control mode and 802.1X client A passes authentication first. If 802.1X client A goes offline first, then 802.1X client B will lose the corresponding network access permissions.
As shown in the figure, Site1 and Site2 need to communicate through a carrier's BGP/MPLS IP VPN. A public network tunnel has been established between PE1 and PE2 (label information is shown in the figure). PE1 has advertised the 192.168.1.0/24 route of Site1 to PE2 through MP-IBGR and route learning is normal. What is the top label in a data packet transmitted on the link P -> PE1 if the packet is sent by Site2 to 192.168.1.0/24 of Site1?
A3
B6662
C6661
D8888
Which of the following statements regarding forwarding equivalence class (FEC) in MPLS are incorrect? (Choose all that apply.)
APackets with the same FEC are processed differently on a MPLS network.
BFECs can be divided flexibly by source IP address destination IP address, source port, destination port, protocol type, VPN, or any combinations of them.
CMPLS classifies packets with the same forwarding processing mode into one FEC.
DOne FEC has only one unique label marker.
The following figure shows the inter-AS MPLS L3VPN Option C (solution 2). ASBR-PE2 is connected to CE3 and runs EBGP. To enable all CEs to communicate with each other, in which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2? (Choose all that apply.)
AVPNv4 address family
BUnicast BGP address family
CVPN instance unicast address family
DBGP-LS address family
Which of the following statements are correct about the topology shown in the figure? (Choose all that apply.)
APC1 and PC2 have different masks, so they cannot communicate with each other.
BPC1 and PC2 have different masks, but this does not necessarily cause a communication failure.
CPC1 and PC2 are associated with the same BD, so they can communicate with each other.
DPC1 and PC2 are associated with the same BD but have different VNIs, so they cannot communicate with each other.
The RR is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed? (Choose all that apply.)
ACo-deployment of the RR and hub site
BIndependent deployment of the RR
CMulti-area deployment of the RR
DPartially independent deployment of the RR
In the Huawei CloudCampus Solution, which of the following onboarding modes are supported by APs? (Choose all that apply.)
ACloudCampus APP
BRegistration center query
CWeb system -D.CLI
Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.
ATrue
BFalse
gRPC is a language-neutral, platform-neutral, and open source remote RPC system and supports the service methods of unary RPCs and streaming RPCs. Which of the following service methods are not supported by gRPC? (Choose all that apply.)
As shown in the figure. LDP is used to establish LSPs on the BGP/MPLS IP VPN backbone network. To enable two sites of User X to communicate through BGP/MPLS IP VPN. PE1 and PE2 must use loopback interface addresses with 32-bit masks to establish an MP-IBGP peer relationship.
ATrue
BFalse
The architecture of the Huawei SD-WAN Solution consists of the management layer, control layer, and network layer. Which of the following devices are deployed at the network layer? (Choose all that apply.)
ARR
BEDGE
CFirewall
DGW
Which of the following statements about SR-MPLS Policy candidate paths are correct? (Choose all that apply.)
AAn SR-MPLS policy can contain multiple candidate paths with the preference attribute.
BThe valid candidate path with the highest preference functions as the primary path of the SR-MPLS Policy.
CA candidate path can contain multiple segment lists with each segment list carrying the weight attribute.
DLoad balancing can be implemented among candidate paths and among segment lists.
Which of the following statements about internal priorities are incorrect? (Choose all that apply.)
AAll external priorities can be mapped to internal priorities in a one-to-one relationship.
BThere are eight internal priorities.
CThe highest internal priority is CS7.
DThe highest internal priority is EF.
Which of the following statements about the Portal protocol are correct? (Choose all that apply.)
AThe Portal protocol describes protocol interaction between the Portal server and access devices. It is used to transfer parameters such as the user name and password.
BThe Portal protocol uses the client/server structure and runs over UDP.
CThe Portal protocol supports two authentication modes: CHAP and PAP. CHAP is more secure than PAP.
DPortal packets use the TLV format to carry attributes, such as the user name password, and MAC address.
SR-MPLS is enabled on all routers. The label information encapsulated by R1 into a data packet is shown in the figure. Which of the following MPLS labels is carried in the data packet when it is sent from R2 to R4?
A2032
B2024
C2046
DNo label
What is the largest number of CPEs that a site can support in the Huawei SD-WAN Solution?
A1
B2
C3
D4
Which of the following causes may result in an IS-IS neighbor relationship fault? (Choose all that apply.)
AThe devices on two ends of a link have the same system ID.
BThe devices on two ends of a link have inconsistent IS-IS levels.
CWhen an IS-IS Level-1 neighbor relationship is established, the devices on two ends of a link have inconsistent area addresses.
DThe IP addresses of interfaces on two ends of a link are on different network segments.