In the shared network, which mechanism is used to prevent duplicate traffic PIM-SM?
A. Register mechanism
B. BSR/RP mechanism
C. Assert mechanism
D. Join/Prune mechanism
The following law is correct by the VRRP protocol.
A. VRRPv2 VRRP v3 and both support authentication
B. VRRPv3 VRRPv2 does not support function authentication, but supports function authentication.
C. VRRPv2 IPv4 VRRPv3 IPv6 only for networks, for network only
D. Mater IP VRRP 255 0-254 The address of the owner has excellent
Regarding the OSPFv3 protocol, the following describes the error?
A. In the case of sharing a router, each process runs independently OSPFv3
B. OSPFv3 in the same process under the same interface, you can run multiple instances.
C. Support road operation multiple cases single chain real
D. OSPFv3 Instance ID header contains fields
About the prevention mechanism BGP, ? ring The following description is correct
A. The AS-PATH attribute of the autonomous system is used to prevent the loop.
B. Cluster List Cluster List The Cluster ID attribute is used for the anti-ring in the reflector cluster. The discovery of the router routing entry contains its own and will reject the routing.
C. The learned route will not announce to IBGP IBGP, AS neighbor is used to prevent internal routing loops.
D. You can use the attribute to prevent the AS-CONFED-SET link in the alliance.
A bookstore provides a wired network for customers to learn online. However, some users are suddenly
unable to access the network. After troubleshooting, it is found that all the IP addresses in the DHCP
address pool have been used up.
Which of the following is the best way to solve the problem?
A. Configure static ARP binding entries
B. Configure IPSG
C. Configure DAI
D. Limit the maximum number of DHCP snooping binding entries that can be learned on an interface.
The network administrator defines a traffic policy as follows:
The router port to which the traffic policy is applied has been idle for about 10 seconds. In this case, if there is suddenly a large amount of c1 burst traffic, what is the number of bytes in the green packets?
A. 32 Kbytes
B. 256 Kbytes
C. 80128 bytes
D. 48128 bytes
Both IS-IS CSNPs and OSPF DD packets describe the brief information about link state databases in MA
network.
Which of the following statements regarding the two types of packets is true?
A. After CSNPs and DD packets are received by the peer router, the peer router needs to send an acknowledgement message; otherwise, the packets need to be retransmitted.
B. Once the neighbor relationship is established, CSNPs and DD packets are not sent.
C. The master/slave relationship in OSPF DD packet exchange is not bound to DR/BDR; and CSNPs are generated only by the DIS.
D. After CSNPs and DD packets are received by the peer router, the peer router does not need to send an acknowledgment message.
Which of the following statements regarding MPLS is false?
A. MPLS supports multi-layer nesting. The value of the S bit of the innermost label is 1.
B. The label space range of dynamic signaling protocols such as LDP and MP-BGP from 16 to 1023.
C. When an IP packet is transmitted on an MPLS network that uses TTL processing in pipe mode, the TTL value of the IP packet decrements by 1 only at the ingress and egress nodes of the MPLS network.
D. The MPLS label is 20 bits long and is used for packet forwarding.
When a router receives an LSP on a broadcast network or a P2P network enabled with IS-IS, the router needs to send a PSNP to ensure LSDB synchronization.
A. TRUE
B. FALSE
When an advertised route is deleted from a BGP router, the BGP router sends an Update packet to withdraw the route. This Update packet carries the well-known mandatory attributes of the route to be withdrawn.
A. True
B. False