Which of the following statements regarding OSPF neighbor relationship and adjacency is true?
Which of following tasks need to be completed during the planning stage of a project?
(Multiple choice)
Which of the following items are used to remind customers of information security?
Which of the following statements regarding border security optimization are true?
VPN models are classified into two types overlay vpn and peer-to-peer vpn iliw —
Huawei enterprise network NMS eSight has three editions: standard, and professional. Unlike the standard edition, which of the following features is provided by the professional edition?
Preferences of routing protocols determine the sequence in which a router selects a
route among route to the same destination learned through different routing protocols
Which of the following causes will lead a failure to establish BGP peer relationships?
When two bgp peers establish a TCP connection normal but their AS number and
BGP versions are inconsistent, Which message will be identified as incorrect during negotiation in the error code of the notification message?
When two routers establish a logical BGP peer relationship over multiple physical links the peer connect-interface command must be used.
Which of the following statements regarding the firewall zone security level is false?
In the port mirroring, real and reliable data must be collected in real time.
Software upgrade operations are similar for Huawei data com products, therefore, before a software upgrade, you only need to briefly read the upgrade guide.
The traditional tail drop method is used for packet loss which causes global TCP synchronization
Which of the following contents are included in a project implementation solution?
When OSPF runs in a broadcast network DR and BDR need to be elected in which state will DR and BDR be elected?
ACL have two types of matching order configuration order and automatic order
Which of the following are included in the full lifecycle guest management of the agile Controller.
DHCP uses different types of packets to implement different functions. Which of the following is the function of the DHCP Offer packet?
Main in the -middle attacks or IP spoofing attacks are common on intra nets and will cause information leakage, which configuration method can prevent these attacks?
Which of the following troubleshooting methods is not based on the TCP/IP reference model?
In an OSPF routing domain two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.
In addition to P2P network, which of the following network types is supported in IS-IS else?
SDN and NFV are essential the same concept and both define network function virtualization.
Which of the following methods is used to control internal employees and guests access networks in the agile controller wireless access control scenario?
When QoS is deployed on a network to improve the quality of some services, the quality of other services must deteriorate
LDP uses Discovery messages to discover neighbors through different neighbor discovery mechanisms. Which of the following statements regarding basic discovery mechanisms are true? (Multiple Choice)
The difference between an OSPF NSSA area and a stub area is that external routes can be imported into a NSSA area.
Which of the following statements regarding virtual link in OSPF is false?
AN ABR IN AN OSPF TOTALLY STUB AREA DOES NOT FLOOD. TYPE 3 LSAS.TYPE 4 LSAS.OR TYPE 5 LSAS WITHIN THIS AREA. WITHIN THIS AREA TO INSTRUCT HOW TO TRANSMIT PACKETS TO A DESTINATION OUTSIDE AN AS.
In vAR application scenarios, which functions of the AR Router can be virtualized on
a server?
Which of the following statements regarding multicast MAC addresses are false?
When BFD detection intervals at both ends are 30ms and
40ms.Which of the following statement is true?
What is the function of the detail-suppressed keyword in the aggregate command?
A route-policy can have multiple nodes, and each node can have multiple if-match and apply clauses. Which of the following statements are false?
(Multiple Choice)
Fast detection technology can rapidly detect communication faults between neighboring devices as soon as possible so that the interrupted
Which of the following statements regarding IGMP snooping are true? (Multiple Choice)
An access control list (acl) can be used to match routing information or addresses of data packets.it can only identify a specific of packets and cannot filter packets.
In the act configuration command ad (number) ad-number (match-order{auto|config}], the ad-number parameter specifies an
The agile controller is an automated control system for network resources it provides a unified policy engine to realize unified access control policies within the.
Link aggregation bundles a group of physical interfaces to from a logical interface the bandwidth. Link aggregation work in can