What characteristics must a high-risk operation plan have?
A. with verification
B. Strong operability
C. accurate
D. can return
Which statement about DHCP Snooping is wrong?
A. DHCP SnoopingYou can prevent illegal attacks by setting trusted ports (all interfaces are untrusted by default mouth)
B. Global enableDHCP Snoopingfunction, without any post-parameters, the device only processes by default DHCPv4message
C. Enable in interface viewDHCP Snoopingfunction, then all theDHCPThe message command function takes effect
D. existVLANEnable in viewDHCP Snoopingfunction, then all interfaces of the device receive data belonging to thisVLANofDHCPThe message command function takes effect
IS-/S supports multi-instance and multi-process, that is, one IS-S router. Multiple VPN instances can be configured with multiple IS-IS process associated. Are the following descriptions of IS-JS multi-instance and multi- process correct?
A. indivualIS-ISprocess can only be used with1indivualVPNinstance association
B. if oneIS-ISThe router creates multipleIS-ISProcess, each process does not affect each other, independent of each other
C. 1indivualIS-ISprocess can be associated with multiple differentVPNinstance association
D. 1indivualVPNInstances can be associated with multiple differentIS-ISprocess association
A campus deploys both IPv4 and IPv6 networks for service testing, and runs IS-IS to realize network interconnection. The IS-IS routing protocol has good scalability and is widely used in the existing network. Which of the following statements is true about IS-IS scalability?
A. IS-ISuseTLVstructure builds the message so thatIS-ISMore flexibility, flexibility and scalability
B. forIS-ISIn terms of adding new features, only adding newTLVJust
C. IS-ISto supportPV6to addTLVcarryPv6Address information
D. N LPIDYesIS-ISto supportIPv6an addedTLV
BGP authentication can prevent illegal routers from establishing neighbors with BGP routers. BGP authentication can be divided into ID5 authentication and Keychain authentication. Which of the followingBGP packets will carryBGPKeychain authentication information?
A. Open
B. Keepalive
C. Update
D. Notification
The following description of TL in PLSHeader is correct:
A. Limit the LSR
B. Control of upstream equipment for label distribution
C. Similar to the TTL in the IP header, it is used to prevent packet loops
D. To control label distribution
In the MPLS network, there are different operation types for labels, among which the meaning of the "pop" action is:
A. Replace the top label with another value
B. existMPLSAdd the top label to the label stack
C. Replace the top label with another set of labels
D. existMPLSRemove the top label from the label stack
Which of the following will not cause the VRRP backup group to flap?
A. both endsVRRPBackup group preemption delay configuration is inconsistent
B. BackupDevice Interface Packet Loss
C. the time interval of the notification message is too small
D. transmissionVRRPLink flapping of advertisement packets
When there are multiple redundant links in the IS-S network, multiple equal-cost routes may appear. Which of the following statements is false about equal-cost routing within an IS-IS network?
A. When the number of equal-cost routes in the network is greater than the number configured by the command, and these routes have the same priority, Preferred next hop deviceSystem IDLarge routes for load balancing
B. If load sharing is configured, the traffic will be evenly distributed to each link
C. After configuring equal-cost route priorityJS-ISWhen the device forwards the traffic reaching the destination network segment, it will not adopt the load balancing method, but forward the traffic to the next hop with the highest priority
D. For each route in the equal-cost route, a priority can be specified, and the route with higher priority will be preferred. the rest as backup routes