On an RSTP network, when an edge port is in protected state, what operation is performed after the edge port receives BPDUs?
A. The edge port forwards BPDUs.
B. The edge port discards BPDUs.
C. The edge port is shut down.
D. The edge port obtains required information from BPDUs.
What are the types of DDoS attacks? (Choose three.)
A. Attacks by special packets
B. Scanning attack
C. Sniff attack
D. Application-layer attack
Which of the following statement about packet marking is false?
A. TheQosInfo field of the packet can be marked.
B. The DSCP and IP precedence fields of the IP packet can be marked.
C. The 802.1p field of the VLAN packet can be marked.
D. The IP address of the packet can be marked.
Which of the following statements about state transition are true? (Choose three.)
A. The neighbor state machine transitions from the Loading state to the Full state if a LoadingDone event occurs.
B. The neighbor state machine transitions from the Exstart state to the Full state if a NegotiationDone event occurs.
C. The neighbor state machine transitions from the Exchange state to the Full state if an ExchangeDone event occurs.
D. The neighbor state machine transitions from the Exchange state to the Loading state if an ExchangeDone event occurs.
Which of the following statements is false?
A. A Router-LSA is used to describe the local link status information of a router.
B. A Network-LSA is used to describe the link status information of a broadcast network or an NBMA network segment.
C. A virtual link is a virtual adjacency in the backbone area (Area 0).
D. An AS-External-LSA describes how to reach an ASBR.
Which of the following statements about an AS-External-LSA are true? (Choose three.)
A. The Link State ID field specifies the network segment address for an advertised destination.
B. The Advertising Router field specifies the Router ID of an ASBR.
C. The Net mask field specifies the network mask of an advertised destination.
D. The Link State ID and Advertising Router fields are used together to uniquely identify an AS-External-LSA.
An IP-prefix-filter is used to filter IP prefixes and data packets.
A. True B. False
How many multicast IP addresses can be represented by an IP multicast MAC address?
A. 1
B. 23
C. 32
D. 24
Which of the following statements regarding MUX VLAN is false?
A. Each group VLAN must be bound to a principal VLAN.
B. If the VLAN ID has been used by the principal VLAN, this VLAN cannot be used for the VLANIF interface, super-VLAN, or sub-VLAN.
C. After MUX VLAN is enabled on an interface, VLAN mapping and VLAN stacking can be configured on the interface.
D. An enterprise can use the principal port to connect to the enterprise server, a separate port to connect to enterprise customers, and a group port to connect to enterprise employees. Enterprise customers and employees can both access enterprise servers, enterprise employees can communicate with each other, enterprise customers cannot communicate with each other, and enterprise customers and employees cannot communicate with each other.
Which of the following is a valid address within the IPv4 SSM group address range assigned by the IANA?
A. 232.137.1.1/24
B. 225.137.1.1/8
C. 232.137.1.1/8
D. 192.168.1.1