Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

MPLS supports both static and dynamic LSP establishment. Which of the following protocols cannot dynamically establish LSPs in MPLS TE scenarios? (Select all that apply)

A.

OSPF

B.

RSVP-TE

C.

BGP

D.

IS-IS

Based on the configuration in the following figure, how many interfaces on R4 are advertised into IS-IS?

plaintext

CopyEdit

display isis interface

Interface information for ISIS(1)

Interface Id IPV4.State IPV6.State MTU Type DIS

GE0/0/0 001 Up Down 1497 L1/L2 No/No

GE0/0/1 002 Up Down 1497 L1/L2 No/No

Loop0 001 Up Down 1500 L1/L2 -

A.

2

B.

1

C.

3

D.

0

Which of the following statements about 802.1X authentication are correct?

A.

802.1X authentication uses EAPoL to exchange authentication information between the client, device, and authentication server.

B.

In EAP termination mode, EAP packets are terminated and re-encapsulated into RADIUS packets on the network access device. The network access device and AAA server use the standard RADIUS protocol to implement authentication, authorization, and accounting.

C.

EAPoL implements EAP encapsulation on an IEEE 802.3 network, whereas EAPoW implements EAP encapsulation on an IEEE 802.11 network.

D.

In EAP relay mode, EAP packets are directly encapsulated by the network access device into RADIUS packets (that is, EAP over RADIUS, or EAPoR). The network access device and AAA server use EAPoR to perform authentication, authorization, and accounting.

The TTL field encapsulated in the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are correct?

A.

If TTL copy is disabled, users can use the tracert function to view the LSR of the MPLS domain.

B.

The processing of IP TTL copy hides the LSR in an MPLS domain, improving network security.

C.

MPLS provides two processing modes on the TTL field:TTL in the MPLS header copies the IP TTL value when an IP packet enters the MPLS network.The ingress LER sets the TTL value in the MPLS header to 255.

D.

MPLS encapsulation in frame mode supports the TTL field. MPLS encapsulation in cell mode does not support the TTL field.

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.

A.

TRUE

B.

FALSE

A 32-bit MPLS header consists of a 20-bit label used for packet forwarding, a 3-bit EXP field that identifies the IP packet priority, a 1-bit bottom-of-stack flag that identifies the last label, and an 8-bit TTL field. Which statement regarding the TTL field is correct?

A.

This field is used to control the upstream device in label distribution.

B.

This field is used for label management.

C.

This field limits the LSR.

D.

This field is used to prevent packet forwarding loops, similar to the TTL field in an IP header.

SR-MPLS is enabled on all routers. The label information encapsulated byR1into a data packet is shown in the figure.

Which of the following is the forwarding path of the data packet?

A.

R1-R2-R3-R5-R6

B.

R1-R2-R4-R6

C.

R1-R3-R2-R4-R6

Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?

A.

In addition to terminal access security, interface security must be considered during wireless network security design.

B.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

Intranet security refers to both wired and wireless network security.

Network Quality Analysis (NQA) is a real-time network performance detection and measurement technology. It monitors the performance of multiple protocols running on a network. Which of the following protocols can be monitored by NQA?

A.

SNMP

B.

OSPF

C.

ICMP

D.

DHCP