The OpenFlow protocol in SDN architecture is led and actively promoted by the IETF.
A. TRUE
B. FALSE
On an SDN network, network devices only need to be responsible for data forwarding.
A. TRUE
B. FALSE
On a VXLAN network, which of the following statements are NOT true about VNIs? (Choose all that apply.)
A. A VNI is a VXLAN network identifier used to differentiate VXLAN segments.
B. One VNI identifies one tenant, regardless of whether the tenant contains multiple end users.
C. VMs of different VXLAN segments cannot directly communicate with each other Layer 2.
D. A VNI consists of 16 bits.
SDN advocates overlay service cloudification and underlay hardware standardization.
A. TRUE
B. FALSE
Which of the following functions does ONOS have? (Choose all that apply.)
A. Reduces the service provider's CAPEX and OPEX
B. Enables network agility
C. Helps service providers migrate the existing network to dedicated devices
D. Provides a reliable, flexible, and high-performance SDN control plane
Regarding the CE series switches on an SDN network, which of the following statements are true about their application in data centers? (Choose all that apply.)
A. A CE series switch can connect to a server as a TOR.
B. The network between TORs and core switches must be an ECMP-enabled Layer 3 network.
C. The network between TORs and core switches must be a Layer 2 network that runs MSTP to prevent loops.
D. The network between TORs and core switches can be either a Layer 2 or a Layer 3 network.
A trunk port on a switch allows packets from VLANs 3, 4, and 5 to pass, but only packets from VLANs 3 and 4 have tags. Which of the following may be the reason why packets from VLAN 5 do not have tags?
A. The port PVID is 5.
B. The port PVID is 3 and 4.
C. During port configuration, the port trunk permit vlan 3 4 command is configured.
D. GVRP is enabled on this port.
Which statements about the link-state algorithm are true? (Choose all that apply.)
A. The link state is the description of a route.
B. The link state describes the network topology.
C. The link state algorithm does not generate route loops.
D. OSPF and RIP use the link state algorithm.
Which of the following statements are true about the comparison between OSPF and IS-IS? (Choose all that apply.)
A. OSPF runs on the IP layer, and IS-IS runs on the data link layer.
B. For IS-IS, a router belongs to multiple areas, but in OSPF, a router can belong to only one area.
C. DIS election in IS-IS is simple, preemptive, and can be predicted. DR election in OSPF is unpredictable and non-preemptive.
D. OSPF supports P2P/P2MP/NBMA/broadcast networks. IS-IS supports only P2P and broadcast networks.
What kind of packet is used by BGP to transmit version number and AS number information?
A. Open
B. Update
C. Keepalive
D. Notification
Which statement about BGP is true?
A. BGP is used in Ass or between Ass to transmit and control routing information.
B. BGP is used in an AS to discover paths.
C. BGP is directly carried in IP packets.
D. BGP must establish peer relationships based on direct links.
Which of the following methods does not support traffic importing to the MPLS TE tunnel?
A. Static routing
B. Dynamic routing
C. Automatic routing
D. Policy-based routing
Which of the following statements about BGP are true? (Choose all that apply.)
A. BGP calculates and discovers the optimal route.
B. BGP uses TCP as the transport layer protocol with a port number of 170.
C. BGP stability is ensured by the high reliability of TCP, not by its own mechanism.
D. BGP sends only updated routing information, thereby saving a large amount of bandwidth resources.
SNMP uses connectionless UDP as the transmission protocol, whereas NETCONF uses connection-oriented TCP.
A. TRUE
B. FALSE
Which of the following statements about NETCONF are true? (Choose all that apply.)
A. NETCONF provides a protection locking mechanism to prevent operations performed by multiple users from conflicting with each other.
B. NETCONF can query one or multiple records in a table and requires multiple interactions during this process.
C. NETCONF uses XML coding for system compatibility and extensibility.
D. NETCONF uses existing security protocols to ensure network security, and is not bound to any specific security protocols.