Which are the new requirements on the enterprise network stimulated by the mobility trend
VPN models are classified into two types overlay vpn and peer-to-peer vpn iliw —
The SDN controller can intelligently adjust traffic paths based on the network status,
so that can improve the entire network throughput.
In the act configuration command ad (number) ad-number (match-order{auto|config}], the ad-number parameter specifies an
If there are no receivers on a PIM-SM network, which of the following routers will have multicast routing entries?
For inter zone packet filtering, which traffic is belong to transmitted to outbound direction?
DHCP snooping is a security feature that can be used to defend against carious attacks, including
Which of the following causes will lead a failure to establish BGP peer relationships?
Which of the following statements regarding buffer overflow attacks is false?
Which of the following statements regarding huawei network optimization service is false?
During configuration of the WRB3 drop profile, the lower drop threshold and upper drop threshold for AF21 traffic are 35 and 90, the lower drop threshold and upper drop threshold for. and the lower drop threshold and upper drop threshold for AF23 traffic are 25 and 90. The maximum drop probability for AF21, AF22, and AF23 traffic is 10%. Before congestion occurs, which type of traffic can obtain bandwidth guarantee?
Which of the following values can be used to set security levels of user-defined zones of USG series firewalls?
On the DiffServ network, what is the main purpose of defining the service type of the EF classification?
Which of the following commands can display OSPF neighbor status information?
Which of the following statements regarding BGp route reliability is true?
In a route-policy, which of the following BGP attributes can be used in apply clauses?
When BGP path load balancing is not enabled, which type of BGP routes will be sent to BGP peers?
AR series routers provide various slots, which of the following is not included?
On a network running RSTP, some devices use STP. When SRTP-enabled switches detect a topology change, which method is used by the RSTP-enabled switches.
Which of the following operation is performed in the risky operation process?
During MSTP troubleshooting, the display current-configuration command is executed
to obtain the configuration file of the device, which of the following statements is false?
To improve stp running stability a network administrator wants to configure some stp features or protection mechanism on switches. Which of the following configuration roadmaps is correct?
Which of the following procedures are included in IS-IS route calculation?
BFD is a universal fast detection technology that can implement fast switchover, so BFD does not need to be used with other fast switching technologies.
Which of the following statements regarding the operation window time for a software upgrade is false?
In the port mirroring, real and reliable data must be collected in real time.
Which of the following statements regarding selection of active links in LACP mode are false?
Which of the following statements regarding the static LACP mode are false?
The master/salve relationship of ospf neighbors is negotiated using DD. packets
IGMP not only supports IGMP General query and IGMPv2 group-specific query and also IGMPv3 source/group-specific query
The essence of SDN is to construct a brain for a network and achieve optimal global traffic through the global view and centralized control
In DU label advertisement mode if the liberal label retention modes is used the device reserves labels received from all the LDP peers regardless of whether the LDP destination network.
MPLS uses LDP to provide different label distribution modes. Which of the following statements regarding LDP label distribution control modes are false?
When bgp route load balancing is configured and there are two load balancing routes whose first eight bgp attributes described in bgp route the two routes prefix be advertised to neighbors?
Which of the following protocols can be deployed to quickly detect network link faults?
In network define a redundant network topology can be used to precuide higher reliability for customer services which of the following topologies can be used to provide redundancy