Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which of the following statements about IPSG is false?

A.

IPSGcan preventIPaddress spoofing attack

B.

IPSGis a source based on a three-layer interfaceIPaddress filtering technology

C.

IPSGcan be turned onIPPacket inspection alarm function, linked with the network management to alarm

D.

able to passIPSGPrevent the host from changing privatelyIPaddress

Full Access
Question # 5

When a fault occurs, the fault can be classified to reduce the scope of fault location. Which of the following is not an interface configuration fault?

A.

Inconsistent duplex modes of interfaces on both ends

B.

IPaddress conflict

C.

Interface authentication is inconsistent

D.

Inconsistent luminous power at both ends

Full Access
Question # 6

Assuming that the neighbor relationship between BGP routers has been established successfully, the configuration on R1 is shown in the figure. ask for R1

Which router can the route entry 10.10.10.0/24 be delivered to the farthest?

AS 200

bgp 100

peer 13.X3 as-number 300

peer B3.33 connect * interface LoopBackO peer 3.33.3 route-policy COMMUNITY e»porx peer 3333 next >hop-local

peer Xl.3.3 advertise-cofnmunity

network 10.10.T0.0 24

route^poktcy COMMUNITY permit node 10 prefix COMMUNITY spply cocYWTUiiMty route-policy COMMUNITY permit node 20 «p ip prefix COMMUNITr index 10 permit

A.

R1

B.

R2

C.

R3

D.

R4

Full Access
Question # 7

MPLS-straight is slower than IP forwarding.

A.

True

B.

False

Full Access
Question # 8

As shown in the figure, configure a backhaul summary route 10.0.0.0/24 on the border route RT1. next hop

to RT2. At the same time, the default route to the external network is configured. At this point, a routing black hole will appear. The following is about routing

Is the black hole statement correct? (multiple choice)

A.

Configuring black hole routing can solve the routing black hole problem

B.

Routing black hole has no impact on the network and can be ignored

C.

Precise routing $□ can always avoid routing black holes

D.

If the terminal in the network sends data packets to the network segment that does not appear on the internal network, a loop will occur

Full Access
Question # 9

Which of the following statements about MPLS header TTL is correct?

A.

MPLSTcorrect toTTLis handled in two ways. one isIPmessage is enteringMPLSwhen the network MPLSheadTTLcopyIPTTLValue: The other is at the entranceLERWillMPLSheadTTLsystem-settings for 255

B.

Can prevent infinite loop forwarding of packets

C.

copyIPTTLThe way the value is handled is hiddenMPLSDomainLSRPlayed a role in the safety of the lake

D.

Banned from holding shellsTTLin the case of,tracertcan see passingMPLSDomainLSR

Full Access
Question # 10

In BGP/MPLS IP VPN, the 0SPF multi-instance process uses the DN bit to prevent Type5 LSA loops.

A.

True

B.

False

Full Access
Question # 11

Which of the following statements is false when troubleshooting the dual-active failure of a VRRP backup group?

A.

No need to check deliveryVRRPWhether the switch port of the advertisement message is in the sameVLAN

B.

need to check the interfaceVRRPGroupIDIs it the same

C.

Interface needs to be checkedIPWhether the address is in the same network segment

D.

need to checkVRRPgroup of virtualIPIs the address the same

Full Access
Question # 12

Ethernet is a broadcast-enabled network, and once there are loops in the network, this simple factory broadcast mechanism can have disastrous consequences. Which of the following phenomena may be caused by loops?

A.

CPUOccupancy exceeds70%

B.

The device cannot log in remotely

C.

use on devicedisplay interfaceWhen commanding to view interface statistics, it is found that the interface receives a large number of broadcast packets

D.

pass throughpingSerious packet loss during network test with command

Full Access
Question # 13

Which of the following regular expressions can match only BGP routes that pass through AS200 and then through AS300

eyes?

A.

200$|300$

B.

A200|A300

C.

_(200 300)_

D.

_[200 300]

Full Access
Question # 14

As shown below:

IR2] ad 2000

[R2-ad-basic-2000]rule deny

[R2-ad-basic-2000]quit

#

[R2] ospf

[R2-ospf»1]area 1

[R2-ospM-area-0.0.0.1] filter 2000 import

[R2-ospf-1-area-0.0.0,1] quit

[R2-ospf-1] default-route-advertise always

A.

Area2containsType5LSAflood

B.

Area2no insideType3 LSAflood

C.

ArealcontainsType5 LSAflood

D.

Arealno insideType3 LSAflood

Full Access
Question # 15

A campus deploys both IPv4 and IPv6 networks for service testing, and runs IS-IS to realize network interconnection. The IS-IS routing protocol has good scalability and is widely used in the existing network. Which of the following statements is true about IS-IS scalability?

A.

IS-ISuseTLVstructure builds the message so thatIS-ISMore flexibility, flexibility and scalability

B.

forIS-ISIn terms of adding new features, only adding newTLVJust

C.

IS-ISto supportPV6to addTLVcarryPv6Address information

D.

N LPIDYesIS-ISto supportIPv6an addedTLV

Full Access
Question # 16

As shown in the figure, private network routing information is exchanged between PE1 and PE2 and their respective CEs through OSPF, and the same DomainlD is set on both PE1 and PE2. When routes are imported from BGP to OSPF on PE2, it is possible that Which of the following types of SAs are passed to CE2?

A.

Typel LSA

B.

Type3 LSA

C.

Type7 LSA

D.

Type5 LSA

Full Access
Question # 17

Which of the following statements about the MP_REA, CH_NLRI attribute of BGP4+ is correct?

A.

The length of the next hop address can be16or3

B.

AFI (address family)value is2,representIPv6

C.

NLRIfield carryIPv6Routing prefix and mask information

D.

the length of the next hop address is16Time,Network Address of Next Hopcarries the link-local address

Full Access
Question # 18

When 0SPFV2 evolves to 0SPFV3, the LSA format and function are exactly the same, but the network layer in the LSA address from IPv4 to IPv6o

A.

True

B.

False

Full Access
Question # 19

Which of the following are documents that need to be handed over as part of the wrap-up of a structured network troubleshooting process

files?

A, Maintenance suggestions to avoid this fault

B. Troubleshooting Summary Report

C. Troubleshooting Procedure Documentation

D. slightly

Full Access
Question # 20

IEIF expands the functions of OSPF by taking advantage of the strong expansibility of OSPF. To enable it to support IPv6 networks, the expanded protocol is called OSPFv3. OSPFv3 is compatible with OSPFv2.

A.

True

B.

False

Full Access
Question # 21

Which of the following will not cause the VRRP backup group to flap?

A.

both endsVRRPBackup group preemption delay configuration is inconsistent

B.

BackupDevice Interface Packet Loss

C.

the time interval of the notification message is too small

D.

transmissionVRRPLink flapping of advertisement packets

Full Access
Question # 22

The ipv6 enable topology standard has been set in the S-IS protocol view. The meaning of this command is:

Pv4 shares a topology with IPv6.

A.

True

B.

False

Full Access
Question # 23

About the difference between NSR and NSF, which is correct?

A.

NSFCan be done without neighbor routers

B.

NSRMust rely on neighbor routers to complete

C.

NSFMust rely on neighbor routers to complete

D.

NSRandNSFBy6Requires neighbor router to complete

Full Access
Question # 24

As shown in the figure, on the R1 router, the network administrator can control the path of the traffic entering AS100 after modifying the value of the routing entry sent to R2 through the routing policy.

A.

Yes

B.

wrong

Full Access
Question # 25

What is the command to adjust the link cost of an IS-IS interface?

A.

isis cost

B.

isis timer hello

C.

isis circuit-level

D.

isis circuit-type

Full Access
Question # 26

In an MPLS domain, LSR can be divided into Ingress LSR, Transit LSR and Egress LSR according to the different processing methods of LSRs for data. For the same FEC. a certain LSR can be the Ingress LSR of the FEC or the Transit LSR of the FEC. LSRO

A.

True

B.

False

Full Access
Question # 27

Network administrator A wants to use the AS-Path Fiter to match the routing entries of the BGP routing attribute AS_PATH [100 200 300]. Network administrator A sorts out the four configurations in the figure. Which of the following configurations can satisfy network administrator A's requirements? Require?

A.

EC

B.

WayA

C.

*D

D.

WayB

Full Access
Question # 28

OSPF is deployed in a campus to achieve network interworking, and OSPF is also enabled on the GEO/0/2 interface of R3. Area1 is deployed as an NSSA area, and the device addresses are shown in the figure. An engineer configures a static route on R3 to access the loopback interface address of R4, and imports the static route in the 0SPF process. At this point, in the Type5 LSA received by R1, the forwarding address (FA) is____. (Note: Please fill in the IP address without mask)

Full Access
Question # 29

aboutOSPFWhich of the following statements is false?

A.

For a pair of additional 0hers on an Ethernet link, it is normal to stop clearing in the 2-72 state

B.

Stalling in ExStart state may be a bad match between neighbor routers

C.

stagnantINThe it state indicates that the router has received the neighbor'sHello message. butHell messagedoes not include this routerOSPF Router ID

D.

The two router databases are synchronized, SPFAn error occurred in the calculation, it must be because of the RouterID repeated

Full Access
Question # 30

Which of the following are static information coke analysis?

A.

Interface Type

B.

Packet loss rate

C.

License

D.

Equipment type

Full Access
Question # 31

The rules of RR advertising routes violate the rules of IBGP split horizon, so it may cause loops in the AS

road. Which routing attributes does RR use to prevent loops?

A.

Cluster List

B.

Originator ID

C.

Nexthop

D.

AS-PATH

Full Access
Question # 32

Qing technology is a technology to expand VLAN space. It can achieve the function of expanding Vian space by adding a layer of 8D2.1Q Tag on the basis of 8Q2.12 tag message. Which of the following statements about qinq is false?

A.

flexibleQinQAccording to different inner layersTagwith different outer layersTag,correct to the userVLANThe division is more detailed

B.

QinQMakeVLANincreased to4095*4095

C.

QinQtechnology enables private networksLANTransparent transmission on the public network

D.

basicQinQbased on the interface

Full Access
Question # 33

Configure ipv6 preference in IS-IS protocol view. The function of this command is to configure the priority of IPv6 routes generated by IS-Is protocol.

A.

True

B.

False

Full Access
Question # 34

What is the most efficient way to view device alarms through the CLI?

A.

display interface brief

B.

display clock

C.

display alarm

D.

display current-configuration

Full Access
Question # 35

What check items can be set by IPSG?

A.

MA, Caddress

B.

Outgoing interface

C.

VLANID

D.

IPaddress

Full Access
Question # 36

When configuring the DHCP Relay function on the device, the VLAN ANIF interface of the relay connection client must be bound with a DHCP server group, and the IP address of the proxy DHCP server must be configured in the bound DHCP server group.

A.

True

B.

False

Full Access
Question # 37

In the absence of a header, the Domain ID of each OSPF process running on the router and the process ID of the process

Be consistent and can be modified under the process through the domain-id command

A.

True

B.

False

Full Access
Question # 38

In intra-domain MPLS VPN networks, data packets will be encapsulated with two layers of MPLS when they enter the public network and are forwarded.

Label, a description of the two-layer label in the following options. What is wrong is:

A.

MPLS VPNThe outer label is made byLDPprotocol or statically assigneD. the inner label is assigned by the correct end

MP-BGPassigned by neighbors

B.

By default, the outer label is popped before the packet is forwarded to the last hop device

C.

M PLS VPNThe outer layer is labeled as a private network label, and the inner layer label is called a public network label.

D.

Layer labels are used inPEThe device sends the packet correctly to the correspondingVPNmiddle

Full Access
Question # 39

The router ID of OSPF V3 needs to be configured in dotted decimal with a length of 128 bits.

A.

True

B.

False

Full Access