Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An OSPF AS-external LSA describes a route to an AS external network. When the field in the LSA is 0.0.0.0, the traffic destined for the external network is sent to the ASBR that imports this external route. (Enter the acronym in uppercase.)

On an IPv6 network, intermediate forwarding devices do not fragment IPv6 packets for the purpose of reducing their packet processing pressure. Packets are fragmented only on the source node.

A.

TRUE

B.

FALSE

In IPv6, interface IDs can be manually configured, automatically generated by the system, or generated based on the IEEE EUI-64 standard.

A.

TRUE

B.

FALSE

Typically, a protocol that occupies two ports during communication is called a multi-channel protocol. For such protocols, the ASPF function must be enabled on the firewall to ensure smooth setup of the data channel and reduce the risk of attacks. Which of the following protocols is not a multi-channel protocol?

A.

FTP

B.

SIP

C.

SMTP

D.

H.323

After which of the following parameters are modified does an IS-IS neighbor relationship need to re-established?

A.

The cost of an IS-IS interface is changed.

B.

The IP address of an ISIS interface is changed.

C.

The level of an ISIS interface is changed.

D.

The interval at which an IS-IS interface sends IIH packets is changed.

Which of the following attributes must be carried when BGP sends route update messages?

A.

MED

B.

Next_Hop

C.

AS_Path

D.

Local_Preference

ON a stateful inspection Firewall where there is no session table, when the status detection mechanism is enabled and the second packet (CYN+ACK) of 3-way hadshakes reaches the firewall. Which of the following statements is true?

A.

If the firewall security policy permits packets to pass, the session table is created.

B.

By default, when status detection is disabled and the permit policy is configured packets can pass.

C.

Packets must pass the firewall, and a session table is established.

D.

If the firewall security policy permits packets to pass, the packets can pass the firewall.

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

On an IS-IS network, each router can generate LSPs. Which of the following events trigger the generation of a new LSP?

A.

Related IS-IS interfaces go up or down.

B.

Periodic updates occur.

C.

Inter-area IP routes change.

D.

The IS-IS interface cost is increased.

On a WLAN, engineers can use the VLAN pool mechanism to assign access users to different VLANs, which helps reduce the number of broadcast domains and improve network performance. VLAN pools support two VLAN assignment algorithms: even and hash. Drag the advantages and disadvantages to the two algorithms.(Token is reusable)