Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You have developed a third-party Portal authentication application and connected it to iMaster NCE-Campus to perform Portal authentication for Wi-Fi users. After connecting to Wi-Fi, a user will be redirected to the login page pushed by the authentication application when visiting any website for the first time.

A.

TRUE

B.

FALSE

As shown in the following figure, OSPF is deployed on a campus network to implement network interconnection, and Area 1 is deployed as an NSSA. To enable R1 to access R4’s loopback interface address, an engineer imports a direct route to R4’s OSPF process. Which of the following statements about this scenario are correct?

[R4-ospf-1] import-route direct

Loopback0: 10.1.4.4/32

A.

R2 is an ABR and translates Type 7 LSAs carrying the default route information into Type 5 LSAs.

B.

R2 is an ABR and translates Type 7 LSAs that describe external routes into Type 5 LSAs.

C.

R4 is an ASBR in the NSSA and generates Type 7 LSAs carrying the default route information.

D.

R4 is an ASBR in the NSSA and generates Type 7 LSAs to describe external routes.

Which of the following statements is incorrect about the user authentication points on the network?

A.

Deploying user authentication points at the access layer achieves granular permission management and high network security.

B.

Moving user authentication points from the access layer to the aggregation or core layer greatly reduces the number of user authentication points, thereby effectively mitigating the pressure on the AAA server.

C.

Deploying user authentication points at the access layer has both advantages and disadvantages when compared to doing so at the aggregation or core layer. Policy association can be applied if user authentication points are deployed at the access layer.

D.

When user authentication points are moved from the access layer to the aggregation layer, MAC address authentication for users may fail.

Which of the following headend behaviors can insert SRHs into IPv6 packets? (Select All that Apply)

A.

H.Encaps.Red

B.

H.Insert

C.

H.Encaps

D.

H.Insert.Red

As shown in the figure, what is known about the default routes on R4?

Routing Table on R4:

< R4 > display ip routing-table protocol isis

Destination/Mask Proto Pre Cost Flags NextHop Interface

0.0.0.0/0 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

172.16.1.2/32 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

172.16.1.3/32 ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

A.

Four equal-cost default routes

B.

One default route

C.

Two default routes with different costs

D.

Two equal-cost default routes