لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
The following description of the characteristics of multi-instance CE is?
A. Since the MCE device is already bound to the VPN, there is no need to bind the VPN on the PE connected to the MCE devicecorrect
B. The MCE device can determine the source of the routing information according to the interface that receives the routing information, and maintain it in the route forwarding table of the corresponding V
C. MCE is implemented by creating their own routing forwarding tables for different VPNs on the MCE device and binding to the corresponding interface o
D. Configuring MCE enables a CE to connect to multiple VPNs at the same time, which cannot only completely isolate the service between different VPN users, but also reduce the input cost of network equipment
عرض الإجابة
اجابة صحيحة: A
السؤال #2
During the HTTP communication process, the client only sends a request for each HTTP connection. Once the server response data is sent, the connection will be released. To solve this problem, which header field extension can be used to maintain the HTTP session without immediately disconnecting?
A. Cookies
B. Session
C. Connectioncorrect
D. Set-Cookie
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Which of the following steps is not mandatory when manually configuring an OSPF-based SR- MPLS BE tunnel?
A. Enable MPLS globally
B. Configure the LSR ID for routers
C. Enable segment routing globally
D. Configure the adjacency SID for each link
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Regarding the description of MAC address spoofing attack, which of the following statements is correct?
A. A MAC address spoofing attack will cause the data that the switch intends to send to the correct destination to be sent to the attacker
B. An attacker can implement a MAC address spoofing attack by sending forged source Mac address data frames to the switch
C. MAC address spoofing attacks mainly utilize the switch’s Mac address learning mechanism
D. MAC address spoofing attacks will cause the switch to learn the wrong mapping relationship between Mac addresses and IP addresses
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Assume that the SRH of an SRv6 packet has five segment IDs. When the packet arrives at the third endpoint, how many segment IDs does the SRH have?
A. 5correct
B. 3
C. 2
D. 1
عرض الإجابة
اجابة صحيحة: A
السؤال #6
As shown in the figure, SWA, SWB, SWC all run RSTP, GED/O/2 on SWB Ports and GEO/0/1 ports on SWC have a port role of ? Radio
A. Alternative port, Backup port
B. Backup port, root port
C. Root port, Designated port
D. Backup port, Alternative port
عرض الإجابة
اجابة صحيحة: D
السؤال #7
As shown in the following ?gure, by using a route-policy changes the MED value of the route sent from R1 to R2, the network administrator can control the tra?c through which path leaves AS 100.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #8
When the user encounters different events during the authentication process, the user is in an unsuccessful authentication state. At this time, you can configure the authentication event authorization to meet the needs of these users to access specific network resources. Which of the following descriptions about authentication event authorization is wrong?
A. If the user's network access rights are not configured when the authentication fails or the authentication server is Down, after the user authentication fails, the user remains in the pre-connected state and has the network access rights of the pre-connected user
B. Authentication event authorization can support authorization parameters including VLAN, user group and business scheme
C. Events that can trigger authentication event authorization include authentication server Down, authentication server unresponsive, and pre-connection, etc
D. Authorization of a non-authentication success state, also known as escape
عرض الإجابة
اجابة صحيحة: C
السؤال #9
In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, BGP EVPN advertises the MAC address of a host to the remote VTEP through a Type 5 route.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #10
SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A network administrator fails to access devices on the internal network through Telnet. Which of the following causes is the most impossible?
A. The route is unreachable, and the client fails to establish a TCP connection with the server
B. The number of login users reaches the upper limit
C. An ACL is bound in the VTY user interface view
D. The protocol inbounds all command is configured in the VTY user interface view
عرض الإجابة
اجابة صحيحة: D
السؤال #12
MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed by a single switch The interchange resolves the RSTBPDU to MSTBPDU, where IRPC is 0
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #13
ISIS elects DIS in broadcast multiplexed access networks, and the following statement about DIS is correct? (Multiple choice)
A. ISIS elects dis by comparing priorities, and mac addresses if the priorities are consistentcorrect
B. In a broadcast multiple access network, DIS sends Hello PDUs at three times the frequencycorrect
C. DIS guarantees database synchronization by periodically sending CSNP messagescorrect
D. DIS supports preemption function, after the new DIS preemption is successful, there is no need to flood any LSP packet
عرض الإجابة
اجابة صحيحة: ABC
السؤال #14
CMPv6 uses the Type field to identify the message type, and according to the value of the type field, we can divide the ICMPv6 message into two categories, one is the error message and the other is the information message
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #15
In DU label advertisement mode, if the liberal label retention mode is used, the device reserves labels received from all the LDP peers regardless of whether the LDP peer is the optimal next hop for reaching the destination network.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #16
As shown in the figure, the ARP broadcast suppression function is enabled in the BD20 domain on VTEP1, and VTEP1 has learned the ARP information of PC2 through the BGP EVPN route. When the ARP request sent by PC1 for PC2 is forwarded by VIEP1 to VIEP2, which of the following is the destination MAC address of the inner data frame?
A. MAC C
B. MAC A
C. MAC B
D. MAC Dcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #17
If the ipv6 enable topology standard command is run in the IS-IS view, IPv4 and IPv6 share the same topology.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #18
Which of the following statements about the difference between NSR and NSF is correct?
A. NSF must rely on neighbor routers to completecorrect
B. Both NSR and NSF require neighbor routers to complete
C. NSF can be done without neighbor routers
D. NSR must rely on neighbor routers to complete
عرض الإجابة
اجابة صحيحة: A
السؤال #19
BIER, as a new forwarding technology, adopts the basic IGP routing protocol and unicast routing forwarding mechanism, so that there is no need to run IGMP between the multicast receiver and the multicast router.
A. TRUE
B. FALSEcorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Which of the following NAT64 prefixes does not require manual configuration by the administrator?
A. 64:FF9B::/32
B. 64:FF9B::/16
C. 64:FF9B::/64
D. 64:FF9B::/96correct
عرض الإجابة
اجابة صحيحة: D
السؤال #21
How many bits are there in the MPLS label field?
A. 8
B. 1
C. 3
D. 20correct
عرض الإجابة
اجابة صحيحة: D
السؤال #22
Which of the following messages does the BGP protocol support?
A. Updatecorrect
B. Opencorrect
C. Hello
D. Keepalivecorrect
عرض الإجابة
اجابة صحيحة: ABD
السؤال #23
BGP-LS (BGP Link State) carries information such as links, nodes and topology prefixes.
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #24
In the scenario of dynamically establishing a VXLAN tunnel through BCP EVPN, when using BGP EVPN Type2 routing for host MAC address advertisement, which of the following descriptions is correct?
A. It will carry specific L2 VNI and L3 VNI values at the same time
B. Will carry specific L3 VNI value
C. The RT value carried is the Export RT in the IP VPN instance
D. The IP Address and IP Address Length fields will not carry specific content
عرض الإجابة
اجابة صحيحة: D
السؤال #25
XLAN uses BGP EVPN to establish a tunnel, what type of message is used? (Single choice questions).
A. Typel
B. Type2
C. Type3correct
D. Type4
E. Type5
عرض الإجابة
اجابة صحيحة: C
السؤال #26
IPV6 multicast introduces the concept of multicast scope, which of the following ways is the multicast scope concept implemented? Multi-select
A. When the group shake source sends IP6 multicast data, the TTL value of the packet is set to limit the transmission range of the group shakecorrect
B. There is a special field in the IPv6 multicast address that specifies the propagation range of multicast
C. Multicast scope is just a concept of spreading scope, and there is no specific technical implementation
D. During network configuration, the administrator uses the configuration command at the edge of the network to limit the multicast scope
عرض الإجابة
اجابة صحيحة: ABD
السؤال #27
A home user has opened a 1Mb/s bandwidth, and in order to improve the user experience, the operator can stabilize 2Mb/s when measuring speed If we use the listening bucket technology to achieve this requirement, which of the following methods is optimal.
A. cir 10000 pir 12000correct
B. cir 10o00 cbs 12000 pbd 12000
C. cir 8000 pir 12000
D. cir 10000 cbs 10000 pbs 12000
عرض الإجابة
اجابة صحيحة: A
السؤال #28
The default sending interval of BFD detection packets is?
A. 1000mscorrect
B. 10s
C. 5s
D. 100ms
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #30
In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is
A. The root protection feature is enabled for the specified port, and its port role can only remain as the specified port
B. When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable
C. after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performedcorrect
D. Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: