As shown in the figure, a company wants to achieve secure mutual access between the head office and branches through MPLSVPN, and at the same time requires that the IPN traffic of the branch bank must be forwarded through the head office to achieve traffic monitoring
Which of the following scenarios send free ARP messages?( Multiple choice questions).
Assume that BGP/MPLSIPVVPN, OSPF, LDP, and static routing protocols are already enabled on the PE router . Which of the following protocols need to enable GR on PE in order to get NSF functionality? (Multiple choice questions).
DHCPv6 servers support additional configuration information such as DNS server addresses for hosts.
Which of the following configurations is the correct OSPFv3 route aggregation configuration:
As shown in the figure, the neighbor relationship between R1 and R2 has just been established, and the database synchronization process between R1 and R2 is correct.
Is the following figure correct about NDP's process of resolving link-layer addresses?
In an MPLS BGPVPN networking that does not enable MPLS penultimate hop pop-up technology. When the message reaches the last hop PE, the message has two layers of labels, and the two layers of label values can be the same.
If the Interface Sticky MAC function is enabled, what is the number of MAC addresses that the interface learns by default?
One of the things you're doing is compressing the length of ip6 addresses as much as possible . The existing IP6 address is
2013xX0C130F006009cO87641308, to be able to make this P6 address more concise, you can compress the IP6 address into which of the following?( Single choice questions).
SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data
As shown in the figure, SWA, SWB, SWC all run RSTP, GED/O/2 on SWB Ports and GEO/0/1 ports on SWC have a port role of ? Radio
The Serial Number field of LS is used to detect expired and duplicate LSAs. The field is a 32bt signed integer, so the small serial number is Ox8000000
If we have a VPN instance configured on a router, if we need to view the VPN route on a Huawei router, which of the following commands should we use?
If the topology of the entire network does not change, but the allocation of IP segments in the router changes, ISIS only uses PRC to calculate the changed routing information, and does not recalculate all SPT
Regarding the cross-domain VPN-OptionB scenario, what is the following description incorrect?
A campus deploys OSPF to achieve network interoperability, and an engineer configures R2 as shown in the figure, then the following description of the LSA in the OSPF network is wrong
The authentication types of ISIS include interface authentication, zone authentication, and routed domain authentication
What mechanisms or techniques can VRRP combine with to monitor uplink connectivity?
If the PIM-SM protocol is running in a multicast network , you need to configure RP, and the configuration equation of RP is divided into dynamic RP and static RP. The following configuration description of the RP is correct (radio).
There is an existing router running OSPF HWL, HW1 interface serial0 is published in zone 1, configure commands under the OSPF process nssa default-route-advertise, based on the previous description, infers which of the following options are correct?
By default, which of the following security MAC address types lose table entries after the device restarts?
In a network in MPLSVPN, different CE devices can exchange routing information with the same PE device using different routing protocols, and different CE devices can exchange routing information with the same PE The routing protocols used between devices are independent of each other
The advantages of building a campus network using stacking, clustering technology include which of the following?( Multi-select)
The interface Serial0 of an existing router is in OSPF area 1, and the interface Serial0 is set to Silent interface. So what kind of impact will this setting have
You need to configure smart policy routing on the router to specify that specific traffic is forwarded through an interface. When policy-based routing is applied, what are the two most typical types of information that can be used to forward traffic along a particular path?
As shown in the following figure, R1 and R2 establish a neighbor relationship for Level2, which is critical: placed as follows, then the following about The route entry for R2 is correct
If a Huawei S series switch needs to designate a member switch as the primary switch of the stack, it can power on this switch first, and then power on other member switches after 20s.
The following description of the BGP route reflector is ?( Multiple choice questions).
If you delete a declared route entry on a BGP router, the BGP routing ring is triggered to send an Update message for route scattering, which carries the accepted mandatory attribute of the route entry that was discarded.
If multiple candidate RPs are configured in a multicast group, which of the following parameters does the RP that elect the group from multiple candidate RPs need to be compared?
The following description of VRRP load sharing is correct?( Multiple choice questions).
The switch uses IPSG technology to verify the source address of the IP packet, and the verification matrix used by the IPSG is obtained through the ARP resolution process in the listening network
XLAN uses BGP EVPN to establish a tunnel, what type of message is used? ( Single choice questions).
In the laboratory network, the network is built according to the following topology diagram, SWI is the default configuration, and SW2 disables the switch STP function.
Configuration under a certain interface: isis timer hello 5 level-2, the following statement is correct?
As shown in the figure, which of the following options satisfies two routers to establish an ISIS neighbor?( Single choice questions).
Port isolation technology deployed in Ethernet can realize Layer 2 interoperability and Layer 3 isolation, making networking more flexible.
There are many ways to establish a cluster on a box switch, what methods does Huawei frame switch support to establish a cluster?
As shown in the figure, the use of redundant links between the branch and the headquarters to establish IPsecVPN, while turning on URLPF on the Router_B for traffic from branch l, which of the following options is correct?
The following statement about the five types of LSAs in OSPF is used to pass external routes, and the following statement about the five types of LSAs is incorrect and flooding in
The following statement about EVPN Type5 routing is wrong?( Single choice questions).
An engineer performed the ingestion operation on an OSPF router in a network of the company, is the following statement about the introduction of the routing LSA correct?
If there is a switch running RSTP, which interface on that switch sends the BPDU with the Proposal logo??
Which SNMP message type sent to NMS reports events that are reliable? ( Single choice questions).
When a Layer 3 switch sends IP packets originating from one VLAN to another LAN, which field in the following options is overridden?( Single choice questions).
Router HW1 exists in the carrier HW's network as an MPLSLSR router. The router receives a packet carrying a label, but the label entry does not exist in its LFIB. So how does the router handle that message?
In the use of the LACP protocol, the following description is correct ?( Multiple select).
What are the ways to divide VLANs in Huawei switches? ( Multi-select) A Subnetting based on IP.
B. Division based on QoS
C. Partitioning based on port
D. Division based on protocol
E. Division based on MAC address.
A bookstore provides a wired network for customers to learn online. However, one day, it was found that some users could not access the network, and after inspection, it was found that the IP resources of the DHCP address pool had been exhausted. Which of the following is the best way to solve the problem of the moment? ( Single choice questions).
Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio).
There is a new HW office that needs to use their router as a DHCP server. When configuring the DHCP server to provide DHCP services to the current office, what of the following items need to be configured?
The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions).
Cross-device link aggregation realizes the back-to-back transmission of data traffic and the mutual spare of the heap member switches, but due to the limited bandwidth of the heap cable between the heap devices, the forwarding efficiency can be improved in the following ways?
Regarding route introduction, the following description is correctly ?( Multiple choice questions).
Regarding the Stub region and the NSSA region of the OSPF protocol , the following statement is incorrect with a single choice
An engineer uses 2 routers to test Pv6 services and runs OSPFV3 to achieve interconnection and interoperability of IPV6 networks The RI has access to the loopback address of R2 The engineer looks at ri's OSPF3 routing table entry and finds that there is no route reaching the R2 loopback address It can't be caused by which of the following?
In the city, that is, mpLS BGPVPN network, when the packet enters the public network forwarding, it will be encapsulated with two layers of MPLS tags, the following description of the two layers of tags, the error is ?
A medium-sized campus network manages the network through the SNMP protocol, and the campus is highly network-safe, so which version of SNMP is recommended for management?
In VXLAN scenarios, what features can be turned on to reduce flooding of ARP messages between VTEPs?( Multiple select).
QinQ technology is a technology that extends the VLAN space by adding a layer of 8021Q tag messages to the extended VLAN. The function of space, the following statement about QInQ is mispronounced?
The Layer 3 logical interface on XLAN L3 Gateway that enables communication between different VXLAN virtual networks is ?
Host HW1 in the HW device network Wants to join a video conference, so what does that host do?