Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

On a virtualized network deployed using iMaster NCE-Campus, after creating VNs, you need to configure inter-VN communication. Which of the following configurations is used to achieve VN communication?

A.

Configure traffic filtering.

B.

Create a static route for the VPN instance corresponding to the VN.

C.

Deploy OSPF for the VPN instance corresponding to the VN.

D.

Deploy a routing policy.

In 6PE networking, the shared explicit null label function can be enabled on routers to reduce the number of required MPLS labels. With this function, a router assigns a label with the value (enter only digits) to all 6PE routes.

This figure shows an SRv6 (Segment Routing over IPv6) packet. If the Destination Address field in the IPv6 basic header is FC04::4, the value of the SL (Segment Left) field in the SRv6 header should be ____. (Enter only digits.)

On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows. Which of the following routes will be selected according to the conflict handling principle?

A.

1.1.1.1/32 → SID 2

B.

1.1.1.1/32 → SID 1

C.

2.2.2.2/32 → SID 3

D.

3.3.3.3/32 → SID 1

The BGP ORF function can be used to control the maximum number of routes that can be sent by a BGP peer. To achieve this, which of the following tools is used to send such a route list to BGP peers?

A.

Filter-policy

B.

Route-policy

C.

ACL

D.

IP prefix-list

HTTP/2 is a UDP-based low-delay Internet transport layer protocol.

A.

TRUE

B.

FALSE

When MPLS/BGP IP VPN is deployed, which of the following statements is incorrect about BGP route exchange between PEs and CEs?

A.

When PEs and CEs use BGP to exchange routing information, you do not need to import private network routes to BGP on PEs.

B.

In a Hub & Spoke scenario, when Hub-CE and Hub-PE run an IGP for communication, EBGP cannot be configured on Spoke-PE or Spoke-CE.

C.

In a scenario where PEs and CEs use BGP to exchange routing information, if two VPN sites have the same private AS number, the AS number replacement function can be used to replace the AS number in a received private network route with any specified AS number. This prevents routes from being discarded because of repeated AS numbers.

D.

In a CE multi-homing scenario, the BGP AS number replacement function may cause routing loops. BGP SoO can be used to prevent routing loops at a VPN site.

To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.

A.

TRUE

B.

FALSE

Which of the following is not the function of OSPFv3 Link-LSAs?

A.

Advertises the interface ID of the local router to other routers attached to the link.

B.

Advertises the link-local address of the local interface to other routers attached to the link.

C.

Advertises a list of IPv6 prefixes of the local interface to other routers attached to the link.

D.

Advertises the Options field in the Network-LSA originated on the local link to other routers attached to the link.

Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.

A.

TRUE

B.

FALSE