What characteristics must a high-risk operation plan have?
A. with verification
B. Strong operability
C. accurate
D. can return
As shown in the figure, the network has a loop because STP is not enabled. Which of the following phenomena may be bowed?
A. Hostreceive a large number of broadcasts
B. The device will generate a loop alarm
C. equipmentCPUOccupancy is too high
D. MA, CAddress table flapping
Which of the following options is incorrect:
A. Created by assigning labels staticallyLSPIt can also be dynamically adjusted according to changes in network topology, without administrator intervention.
B. The principle to be followed when manually assigning labels is: the value of the outgoing label of the upstream node is the value of the incoming label of the downstream node
C. LSPstaticLSPand dynamicLSPtwo kinds. staticLSPManual configuration by administrator, dynamicLSPthen use Dynamic establishment of label protocol
D. dynamicLSPDynamically established through the label publishing protocol, such asMP- BGP, RSVP-TE, LDP
In the multi-level RR scenario, a large number of secondary RRs will be connected to the primary RR, which may lead to BGP of the primary RR. The routing table overflows, what method can be used to reduce the risk of overflowing the routing table of the advanced RR BGP?
A. ORF
B. route aggregation
C. routing control
D. set the sameCluster-ID
Configuring DHCP Snooping can be used to prevent imitator attacks, so the configuration process needs to include the following. What are the steps?
A. enable globalDHCP SnoopingFunction
B. enable globalDHCPFunction
C. Configure Interface Trust Status
D. enable interface orVLANofDHCP SnoopingFunction
The routing policy tools that can be used by BGP mainly include Filterpolicy and oRoute- policy. Fiterpolicy can only filter routes, Rote - policy can only modify routes.
A. True
B. False
Regarding the description of the encapsulation format of labels in MPLS, the correct one is
A. MPLSThe total length of a single label is4bytes(32bits)
B. For Ethernet,PPPpacket, the tag stack is like 'shim*--between the L2 header and the data: yesVLAN tagTime,MPLShead on the ether head withVLAN tagbetween
C. in the labelSfield:lbit,Used to identify whether the label is the bottom label of the stack, the value is1is indicated as the penultimate layer label
D. in the labelTTLfields andIPgroupedTTL( Time To Live.,time-to-live) is similar in meaning and also has the effect of preventing loops
If faced with a complex network failure, and it is estimated that the troubleshooting cannot be completed in a short period of time, and the user urgently needs to restore the availability of the network, then the correct approach is.
A. Tell the user it's not possible
B. Directly build an alternative network environment without notifying customers
C. Always try to troubleshoot without informing the user of the current troubleshooting difficulty
D. Communicate with users whether it is possible to skip the faulty node and build an alternative network environment
What fields are added in Update in order to advertise IPv6 routes in BGP4+?
A. a new oneNLRITypes of"Pv6_NLR,which carryIPv6 NLRI prefix lengthandIPv6 NLRI prefix
B. A new path attribute:MP_UNREA, CH_NLRI
C. A new path attribute:MP_REA, CH_NLRI
D. a new path attribute:IPv6_REA, CH_NLRI
Engineer Guan used two routers to test IPv6 services. By running the BGP4+ module to communicate with the branch, as shown in Juxin, an engineer captured packets to view the Updte packets sent by R1. Which of the following statements is true about the description of the message information?
A. This message describes only oneBGPAttribute: Multi-protocol unreachableNLRIAttributes
B. This message describes the current cancellationIPv6routing
C. The maximum and the preceding length of the routing address described in this packet is:2001:db8:2345:l::l/128
D. The next hop address of the route described in this packet is:2001:db8:2345:l::l\
In what ways can log information be viewed:
A. Network management system interface view
B. log in to the device viadisplay logbuferCheck
C. there is no way
D. Willflash:/logfile/Tlog file viaFIP/TFTPtransfer toPCsuperior
OSPF is deployed in a campus to achieve network interworking, and OSPF is also enabled on the GEO/0/2 interface of R3. Area1 is deployed as an NSSA area, and the device addresses are shown in the figure. An engineer configures a static route on R3 to access the loopback interface address of R4, and imports the static route in the 0SPF process. At this point, in the Type5 LSA received by R1, the forwarding address (FA) is____. (Note: Please fill in the IP address without mask)
A. 10.1.23.2
What is wrong with this configuration description is:
[Huawei]dhcp enable [Huaweijinte GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/0/1 ]dhcp option82 insert en [Huawei-GigabitEthernet0/0/1 ]dhcp snooping enable [Huawei-GigabitEthernet0/0/1]dhcp snooping trusted
A. ifGigabitEthemnetOIO/1received by the interfaceDHCPIn the request message, there is noOption82of SutOptioninformation, the device will generateOption82,and insert it into the message
B. turn onDHCP Snoopingconfiguration can be used to preventDHCP ServerCounterfeiter Attack
C. configureGigabitEthernetO/0/lThe interface is a trusted interface
D. turn onDHCP Snoopingconfiguration can be used to preventARPspoofing attack
Which of the following are advantages of VLAN aggregation?
A. decreasedIPwaste of address
B. added availableM LANquantity
C. Increased addressing flexibility
D. accomplishSub-VLANIsolation between broadcast domains
Which of the following are static information coke analysis?
A. Interface Type
B. Packet loss rate
C. License
D. Equipment type