When the virtual router responds to ARP Request packets, the actual MAC address of the master router is used,
A 32-bit MPLS header consists of a 20-bit label used for packet forwarding; A 3-bit EXP field that identifies the IP packet priority; A 1-bit bottom-of-stack flag that identifies the last label; And an 8-bitTTL field. Which statement regarding the TTL field is true?
MPLS forwards data packets based on labels. How is IP packets passing through the MPLS domain forwarded if they do not carry any label?
QoS provides different service quality to meet a variety of different needs. Which of following functions are provided by the QoS? (Multiple Choice)
A DHCP client needs to obtain an IP address from the DHCP server when accessing a network for
the first time. When the client accesses the network again, which of the following statements are true?
(Multiple Choice)
Which zones are provided by the Huawei firewall by default? (Multiple Choice)
In interface queue scheduling, which queue is not fair and different flows in the queue cannot be isolated?
The proxy firewall works at the TCP/IP transport layer and processes services between users of the internal and external networks,
Which of the following statements regarding United Security of the Agile Controller are true? (Multiple Choice)
The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?
Which of the following is not the limitation of traditional networks?
Flow mirroring is divided into local flow mirroring and remote flow mirroring.
MPLS can forward packets only after an LSP is established. Which of the following statements regarding static LSP establishment are true? (Multiple Choice)
Which of the following statements regarding the DSCP priority is false?
What is the characteristic of the packet filtering firewall?
Which of the following queue scheduling technologies is better in a fair manner?
The interface IP address and VRRP virtual IP address can be the same.
LDP uses different neighbor discovery mechanisms. Which of the following statements regarding the LDP neighbor discovery is false?
Which of the following statements regarding Free Mobility of the Agile Controller are true? (Multiple Choice)
Which remote alarm notification modes are supported by eSight? (Multiple Choice)
On the DiffServ network, what is the main purpose of defining the service type of the EF classification?
Information security technology problems are mainly technical problems. Information security work can be done well only by using latest technologies and deploying high-performance devices
What is the broadcast domain of VXLAN called?
Which statement regarding relationship between 802.IX and RADIUS is true?
Which of the following is not the default role of Huawei eSight?
Which of the following statements regarding the authentication domain of the Agile Controller are true?
(Multiple Choice)
VXLAN users can access the Internet through VXLAN interfaces.
Which of the following statements regarding the switch configuration are true? (Multiple Choice)
Flow mirroring is divided into bcal flow mirroring and remote flow mirroring.
MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as a FEC allocation standard?
Which of the following statements regarding MPLS label encapsulation format are true? (Multiple Choice)
What are the advantages of NFV? (Multiple Choice)
Which are the Agile Controller functional components? (Multiple Choice)
Which of the following statements regarding Free Mobility of the Agile Controller are true? (Multiple Choice)
On the traditional IP network, the BE mode cannot distinguish communication types or meet requirements of applications. The emergence of QoS technology is committed to solving this problem.
Which of the following statements regarding Service Chain of the Agile Controller are true? (Multiple Choice)
A MPLS packet contains the TTL field. On a network shown in the following figure, what are the TTL values in the MPLS packet and IP packet sent from SWB to SWC?
Which of the following command is used to configure Eth2/0/3 as a local observing port on a Huawei AR router?
On a carrier's MPLS VPN network, PE1 and PE2 transmit data packets between VPNs. After PE1 receives VPN route 172.16.1.0/24 from a client, it converts the route into a VPNv4 route and distributes label 1027 to the packet. After the packet arrives at PE2, PE2 distributes label 1025 to the packet. When a client on PE2 accesses this route, what are the outer and inner labels in the packet transmitted over the carrier network?
Single-packet attacks indicate that an attacker controls botnet hosts to send a large number of attack packets, causing link congestion on the attacked network and system resource exhaustion.
BFD is a universal fast detection technology that can implement fast switchover, so BFD does not need to be used with other fast switching technologies.
NFV and SDN depend on each other and must be used together.
Congestion management uses queue scheduling to manage and control traffic when traffic congestion occurs.