Which of the following information be learned on the industry background of the project?
To improve Internet egress reliability.an enterprise uses multiple links to connect to different carrier networks, this mode requires attention to both the quality may be affected
BGP is an inter domain routing protocol, which of the following statements regarding
BGP are true?
In most cases, a risky operation solution can be reviewed and finalized one day before implementation
which of the following subsystems are involved in building cabling?
Which of the following trainings are transfer-to-maintenance trainings after project delivery?
Which of the following causes for VRRP group flapping is the most impossible.
The agile controller is an automated control system for network resources it provides a unified policy engine to realize unified access control policies within the.
When two bgp peers establish a TCP connection normal but their AS number and
BGP versions are inconsistent, Which message will be identified as incorrect during negotiation in the error code of the notification message?
Which of the following statements regarding border security optimization are true?
Which of the following causes will lead a failure to establish BGP peer relationships?
Which command is used to configure association between VRRP and a physical interface?
During the sbuctured network troubleshooting process, in which of the following phases is the fault reported or advertised to other departments?
Which of the following statements regarding OSPF external route types is false?
the migration kick-off meeting is held to communicate with the customer about the project, communication with other involved parties is not important
Software upgrade operations are similar for Huawei data com products, therefore, before a software upgrade, you only need to briefly read the upgrade guide.
Which of following tasks need to be completed during the planning stage of a project?
(Multiple choice)
Which of the following statements regarding MAC address spoofing attacks is false?
On the border between an enterprise network and its external network, which of the following devices is deployed at the outermost side of the enterprise network?
The firewall and router can both implement security defense functions and replace each other.
Which of the following BGP attributes is Huawei' s unique attribute?
In the Controller's access control scenario, which of the following statements regarding the roles of the RADIUS server and client is true?
Which of the following causes for a VRRP group two-master fault is the most impossible?
RSTP defines different ports compared with STP. Which of the following ports cannot work in forwarding state?
Which of the following route selection tools can be used by other routing protocols in addition to BGP?
Which of the following statements regarding OSPF authentication commands are true?
In a route-policy, which of the following BGP attributes can be used in if-match clauses?
Which of the following BGP attributes can define a set of destination addresses with the public characteristics?
Which of the following statements regarding PIM-SM hello packets is false?
Which of the flowing statements regarding Huawei eSight network management software is false?
Which of the following are possible causes for an MSTP failure in a LAN?
To avoid global TCP synchronization, which congestion avoidance mechanisms can be used?
Which of the following scenarios is a loop test applicable to?
A source tree is the shortest path form a multicast source to receiver hosts, it is also called a shortest path tree.
Which of the following tools is used to filter routing information and set route attributes based on routing information?
Which of the following BGP routing policy tools can filter routes?
Which of the following statements regarding the OSPF protocol is false?
Which of the following parameters is optional when you configure a RADIUS server template on a Huawei switch?
Which of the following LSPs are established in Downstream Unsolicited (DU) label advertisement mode and ordered label distribution control mode?
Which of the following hello packets are used in IS-IS?
Which of the following statements regarding multicast MAC addresses are false?
AN ABR IN AN OSPF TOTALLY STUB AREA DOES NOT FLOOD. TYPE 3 LSAS.TYPE 4 LSAS.OR TYPE 5 LSAS WITHIN THIS AREA. WITHIN THIS AREA TO INSTRUCT HOW TO TRANSMIT PACKETS TO A DESTINATION OUTSIDE AN AS.
What are the basic work process steps of SDN?
In most cases, optical power is expressed in dbm, which of the following values in dbm is supported by most optical transceiver devices to receive and identify data ?
Which application environment of following is NFV often deployed?
Which of the following methods is used to control internal employees and guests access networks in the agile controller wireless access control scenario?
n a stateful inspection firewall where three is no session table when the status detection mechanism is enabled and the second packet of 3-way handshakes which of the following statements is true?
If a fault cannot be rectified in a short time on a complex network but the customer needs to restore network availability immediately, which of the following actions is recommended?
When bgp route load balancing is configured and there are two load balancing routes whose first eight bgp attributes described in bgp route the two routes prefix be advertised to neighbors?
An advanced ACL is a series of ordered rules with permit or deny clauses. Which of the attributes can be used in act rules to describe IP packets?
Which of the following device discovery modes are supported by huawei eSight network management software?
When a bgp muter receives a route with an unreachable next hop how does it process the route?
The master/salve relationship of ospf neighbors is negotiated using DD. packets
In the VRP, by default, the routes imported by BGP will be automatically summarized.
Which of the following statements regarding huawei eSight network management software is false?
In bgp the origin attribute of the routes imported using the import-router command is incomplete
ACL have two types of matching order configuration order and automatic order
Which of the following regulations does not belong to the onsite behavior regulations during the service process?