New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Huawei H12-261_V3.0 Dumps Questions Answers

Page: 1 / 18
Total 479 questions

HCIE-Routing & Switching (Written) V3.0 Questions and Answers

Question 1

Assume that BGP/MPLS has been enabled on the PE routerIPv4 VPN, OSPF, LDP, and static routing protocols. Which of the following protocols need to enable GR on PE to obtain NSF function?

Options:

A.

BGP

B.

static routing protocol

C.

OSPF

D.

MPLS LDP

Buy Now
Question 2

Compared with IGMPv1, what improvements have the IGMPv2 protocol made?? (multiple choice)

Options:

A.

Added maximum response time field

B.

Added out-of-group packets

C.

Added specific group query message

D.

Added specific source group query packets

Question 3

View the detailed information of all VPN instances on a network device, and the results are as follows. Which of the following statements is false?

Options:

A.

VP configured on the local endThe total number of instances in N with IPv6 address family enabled is 1.

B.

VPN-Instance vpna will not receiveVPN routing with RT of 2:1.

C.

GigabitEtheThe rmet1/0/0 interface is bound to the VPN-Instance vpna.

D.

The device will be the VPN-Instance Each route of the vpna is assigned a label.

Question 4

Since BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors. The routing policy deployed between neighbors is invalid.

Options:

A.

TRUE

B.

FALSE

Question 5

OSPF is enabled on the router HW, the role of the router HW is ABR, and ab is configuredr-summary, then which classes of LSAs will be summarized?(Multiple Choice)

Options:

A.

1Class LSA

B.

2Class LSA

C.

3Class LSA

D.

4Class LSA

Category 5 L SA

Question 6

Which of the following statements about the multicast address used by 0SPFv3 is correct? (Multiple choice)

Options:

A.

DR routers use FF08::6

B.

DR routers use FF02::6

C.

All OSPsF Router uses FFO2::5

D.

All OSPsF Router uses FF08:5

Question 7

Protocols using TCP ports 443, 179, 137, 110 and 23 are

Options:

A.

BGP. POP3. SNMP, TFTP. Telnet B. HTTPS.SNMP.POP3.DNS.Telnet

B.

HTTPS.BGP NetbiosNameServer POP3.Telnet

C.

Finger, DHCP Server, Netbios Name Server, POP3, Telnet E. LDAP. SNMP TFTP. POP3. Telnet

Question 8

What is the role of RT in MPLS VPN?

Options:

A.

allow peerPE decides which VPNv4 routes to import into a specific VRF

B.

allow peerPE decides which VPNv4 routes to not import into a specific VRF

C.

allow peerCE decides which VPNv4 routes to import into a specific VRF

D.

allow peerCE decides which VPNv4 routes to not import into a specific VRF

Question 9

You want only telnet traffic to be able to access the server(address is 10.1.1.100). Then, you added the following A on the routerCL: rule 5 permit tcp source any destination 10.1.1.100 0.0.0.0 destination-port eq 23

rule 10 deny ip source any destination any

Then you apply that ACL to the ingress direction of that router's serial interface. Which of the following types of packets will be allowed to pass through this router? ( confirmed)

Options:

A.

A non-fragmented packet using port 21 to access the server

B.

Packets that are not the first fragment and use port 23 to access the server

C.

Non-first fragmented packets to access other hosts

D.

Packets that are not the first fragment and use port 21 to access the server

E.

The first fragmented or non-fragmented packet that uses port 23 to access the server

Question 10

There are many transition technologies in the process of replacing IPv4 addresses used in the network with IPv6 addresses. These technologies are divided into two categories, one is IPv4/Pv6 coexistence technology, the other is IPv4/Pv6 interworking technology, which of the following options belong to IPv4/IPv6 coexistence technology? (multiple choice)

Options:

A.

NAT64

B.

IPv46 over IPv44

C.

Dual Stack

D.

ISATAP

Question 11

IBGP was established on two Between directly connected devices of neighbors, if the shutdown command is executed to shut down the interface of one of the devices, the BGP connection will not be disconnected immediately.

Options:

A.

TRUE

B.

FALSE

Question 12

in During the establishment of D Passion, the active party will first send Initialization information to negotiate parameters. Which of the following messages will be sent if the passive party does not support negotiated parameters?

Options:

A.

Eerror Notification Message

B.

Keepalive Message

C.

Initialization Message

D.

Hello Message

Question 13

If the advertised route entry is deleted on the BGP router, the BGP router will be triggered to send an Update message for route revocation. Well-known mandatory attribute with revoked routing entries.

Options:

A.

True

B.

false

Question 14

Assuming that the neighbor relationship between BGP routers has been established successfully, the configuration on R1 is as shown in the figure. Which router is the route entry 10.10.10.0/24 advertised by R1 delivered to the farthest?

Options:

A.

R1

B.

R2

C.

R3

D.

R4

Question 15

Since BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors, and it is invalid to deploy routing policies between IBGP neighbors

Options:

A.

TRUE

B.

FALSE

Question 16

What is Huawei's SDN controller using VXLAN technology?

Options:

A.

Agile Controller-Campus

B.

Agile Controller-WAN

C.

Agile Controller-DCN

Question 17

In a broadcast network, the process starts after the neighbor relationship is established.DIS elections.

Options:

A.

True

B.

false

Question 18

About cross-domain VPN_Option Scheme B, the following description is wrong?

Options:

A.

During packet forwarding, the two ASBRs need to exchange the VPN's private network LSP once.

B.

An IP-EBGP neighbor relationship needs to be established between two ASBRs.

C.

Cross-domain VPThe N_OptionB scheme is not limited by the number of interconnecting links between ASBRs.

D.

twoThe ASBRs exchange outer labels for VPNV4 routes.

Question 19

R3 andR1 IS-IS The neighbor is not established. According to the information in this picture, what is the possible reason? (single choice)

Options:

A.

R3 andR1 Systemm ID Repeat

B.

R3 and R1 have different area numbers

C.

R3 andR1 IS-Leve1 Do not match

D.

R3 andR1 IIH Authentication failed

Question 20

The following is about the PIM-SMRegister message description is correct? ( confirmed)

Options:

A.

The Register message enables the RP to learn the multicast source information

B.

The Register message is sent by the receiver router

C.

The Register message is sent to the RP via unicast instead of multicast

D.

The Register message is sent by the source DR

Question 21

What is the protocol number of the IP header of the VRRP packet?

Options:

A.

116

B.

118

C.

112

D.

114

Question 22

What is the difference between traffic policing and traffic shaping?

Options:

A.

Use traffic shaping in the ingress direction and traffic policing in the egress direction

B.

For traffic shaping, routers buffer excess packets until bandwidth is available again

C.

Traffic policing uses the token bucket algorithm, and traffic shaping uses the SPD algorithm

D.

For traffic policing, it can be more thanCIR Traffic Adjustment Buffer Usage

E.

For traffic shaping, can be more thanCIR Traffic Adjustment Buffer Usage

Question 23

As shown in the following topology, EBGP is run between AS100, AS200, AS300, and AS400, and the neighbor relationship has been established. When AS400 receives the BGP route of the network segment 1.1.1.1/32 sent by AS100, the correct order of the paths recorded in the AS Path attribute is: ?

Options:

A.

100, 200, 300

B.

400, 300, 200, 100

C.

100, 200, 300, 400

D.

300, 200, 100

Question 24

traditional BGP-4 can only manage IPv44 Unicast routing information, MP-BGP for In order to provide support for a variety of network layer protocols, BGP-4 expanded. MP-BGP Address families are used to distinguish different network layer protocols. Which of the following address families are currently supported?

Options:

A.

BGP-IPv6 Unicast address family

B.

BGP-VPNv 4 address family

C.

BGP-IPv4 broadcast address family

D.

BGP-VI Instance IPv6 address family

Question 25

In PIM-SM , the following about PIM Join Message. Is the description correct? (single choice)

Options:

A.

PIM Join information.Every 60 Sent once per second to refresh the upstream router m for the multicast treeroute State

B.

PIM Join message per 3 Sent once every minute to refresh the upstream router mroute for the multicast tree State

C.

the upstream router sends a PIMJoin acknowledgement in response to each received from the downstream router

D.

PIM Join message PIM Join message. Only sent when the multicast tree is first established

Question 26

The following description about BGP loop protection is correct: (multiple choice)

Options:

A.

A BGP router will not announce any updates from EBGP peers to its EBGP peers.

B.

Any updates from IBGP peers. Routing information from peers will be advertised to other IBGP peers

C.

Non-RR BGP The router will not advertise anything from the IBGP Updates from peers to other IBGsP peer

D.

Through AS-PATH attribute, discarding any updates received from EBGP peers that contain their own AS number in the AS-PATH attribute

Question 27

There is an As-path-filter:ip as-path-filter 1 permit * (1001400) $, the As-path filter can match which of the following AS_ PATHProperties?

Options:

A.

300 4200

B.

1234 1400

C.

3100

D.

100

Question 28

Which of the following statements about the format of OSPFv3 packets is correct?? (multiple choice)

Options:

A.

OSPF version number changed from 2 to 3

B.

There is no change in the option field of the He11o packet

C.

Hello packets no longer contain address information and carry Interface ID

D.

Removed Authentication, Auth Type field

Question 29

The advanced access control list is a series of ordered rules composed of permit I deny statements. These rules can match IP packets according to which of the following attributes?

Options:

A.

source address

B.

destination port number

C.

source port number

D.

destination address

Question 30

Four routers run IS-IS and have established adjacency relationship. The area number and router level are marked in the figure. What is the cost of R4 reaching 10.0.2.2/32?

Options:

A.

20

B.

10

C.

40

D.

30

Question 31

Regarding route introduction, which of the following descriptions is correct?

Options:

A.

OSPFThere are two types of imported external routes. The first type of external route takes precedence over the second type of external route.

B.

Use default in BGP-route impoThe rted command is only used to import the default route that already exists in the local IP routing table.

C.

When ISIS imports external routes, if the type of route to be imported is not specified, the L1/2 router imports Level-1 by default.routing.

D.

When ISIS imports external routes, if the type of route to be imported is not specified, the L1 router will import Leve1 by default.-1 route.

Question 32

one VRRP virtual router configuration VRID is 3. Virtual IPaddress is 100.1.1.10, then virtual MAC:land. What is the address?

Options:

A.

00-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

01-00-5E-00-01-64

D.

00-00-5E-00-01-03

Question 33

About MP-BGP, which of the following descriptions is wrong? (single choice)

Options:

A.

MP-EGP by MP_REACH_NLRI and IP_UNREACH_NLRI Two attributes to advertise VPNv4 routing

B.

MP-BGP The required message is quasi-VP type N, v4VP route N is distributed by v4 distribution and privately issued network label policy label slightly with BGP-4 same

C.

When the PE and CE exchange routes through BGP, a BGP process needs to be created on the CE for each VPN instance

Question 34

Which of the following statements about BGP route filtering is incorrect?

Options:

A.

Route- The filtering relationship between the nodes of the Policy is"Or", that is, as long as it passes the filtering of a node, it can pass the Route- Policy.

B.

For locally advertised routes, configure routing policies, which take effect before adding routes to the BGP routing table.

C.

In the same node of Route-Policy, multiple if-match clauses for different attributes are "or" relationship.

D.

on receivingBGPWhen routing peers, implement routing policies to filter unnecessary BGP routes, and these routes will not be added to the local BGP routing table.

Question 35

In the process of viewing the debug output through the SSH terminal, a lot of information pops up. Which of the following operations can make the monitor terminal no longer pop up the debug message?

Options:

A.

Open Notepad, enter undo debugging all, copy the command line, paste it into the Monitor interface

B.

Exit the current Monitor interface, re-SSH into the device to open a new Monitor interface

C.

Open Notepad, enter undo terminal debugging, copy the command line, and paste it into the Monitor interface

D.

Open Notepad, enter undo terminal monitor, copy the line command, and paste it into the Monitor interface

Question 36

When deploying MPLS/BGP IP VPN, regarding the use of BGP to exchange routing information between PE-CE, which of the following descriptions is wrong?

Options:

A.

In the case of CE multi-homing, enabling the BGP AS number replacement function may cause routing loops. BGP So can be used to prevent routing loops in VPN sites.

B.

When BGP is used to exchange routing information between PE and CE, if the autonomous systems where the two VPN sites are located use the same private AS number, the AS number replacement function can be used to replace the received AS number with any specified AS number. The As number in the private network route, to prevent the route from being discarded due to repeated AS numbers

C.

When BGP is used to exchange routing information between PE and CE, there is no need to import private network routes into BGP on PE.

D.

In the Hub & Spoke scenario, when Hub-CE and Hub-PE use IGP, Spoke-PE and Spoke-CE cannot use EBGP

Question 37

The results of the existing router data are as follows. Based on this analysis, the conclusions are wrong.

Options:

A.

R3 must be the DIS of a level-1 link

B.

The R3 router is a level-1-2 router

C.

R3 must be the DIS of a level-2 link

D.

R3 router system ID is 0003.0000.0000

Question 38

Which of the following statements about digital certificates is false?

Options:

A.

Digital signatures guarantee the integrity of digital certificates.

B.

Digital certificates contain public key information.

C.

When the peer certificate received is within the validity period, but the device's own time is incorrect and the certificate is not within the validity period, the authentication fails.

D.

two pEven if the RI entity is not in the same CA system, as long as the two parties can identify the other party's CA, the identity verification can be completed.

Question 39

in command aggregateate ipv4-address { mask | mask-length } [as-set I attribute-policy route-policy-name1 ldetail- suppressed I origid-policy route-policy-name2 |suppress-policy route-policy-name3], multiple parameters can be used toAffects summary routes and their results. Which description is correct about this command?

Options:

A.

If As is configured-set, the AS_PATH of the summary route contains the AS path information of all specific routes to prevent routing loops

B.

If Supp is configuredress-policy also generates aggregated routes. The if-match clause in Route-policy is used to select suppressed detailed routes. Detailed routes matching the Route-policy will still be advertised to other BGP neighbors

C.

If Origin is configured-policy, only with Route Only the detailed routes matching the policy can participate in the aggregation

D.

If Attrbute-policy is configured, you can change the attributes of the aggregated route

Question 40

Which SNMP message type to NMS is reliable for reporting events?

Options:

A.

Inform

B.

Get

C.

Response

D.

Trap

E.

Get Bulk

Question 41

When the BFD detection time intervals at both ends are 30ms and 40ms respectively. Which of the following options is correct?

Options:

A.

bfdSession can be established, after negotiation 40ms

B.

bfdSession can be established, after negotiation 30ma

C.

bfdSession can be established. each at its own time interval

D.

bfdSession could not be established

Question 42

The following topology diagram is available. According to this analysis, which of the following statements is correct?

Options:

A.

Route entries for 10.0.2.2/32 and 10.0.0.0/16 exist in R1's IP routing table

B.

There are both 10.0.3.3/32 and 10.0.0.0/16-bit routing entries in the IP routing table of R1

C.

becauseR2 has performed route aggregation, and only the route entry of 10.0.0.0/16 exists in the IP routing table of R1

D.

Route entries for 10.0.2.2/32 and 10.0.3.3/32 exist in R1's IP routing table

Question 43

four routers running IS-IS And the adjacency relationship has been established, the area number and router level are marked in the figure, in R1 Configure routing penetration on the device, thenR4 arrive 10.0.2.2/32 ofCcost What is the value? (Singleselect)

Options:

A.

30

B.

80

C.

50

D.

40

Question 44

run SNMS for NMPv1 ( Network Managementt What messages will Station) send to the Agent?

Options:

A.

Trap, Get and Set

B.

Get, Set and Getnext

C.

Get, Set, Getnext and GetBulk

D.

Get, Set and GetBulk

E.

Trap only

Question 45

Which of the following statements about VXLAN gateways is false?

Options:

A.

Layer 2 gateway:It is used to solve the problem of tenants accessing the VXLAN virtual network, and can also be used for subnet communication of the same VXLAN virtual network.

B.

Layer 3 gateway:Used for cross-subnet communication of VXLAN virtual networks and access to external networks.

C.

VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways.

D.

The Layer 2 gateway is bound to the VPN instance.

Question 46

As shown below, which routes will R2 learn? ( confirmed)

Options:

A.

R2 can learn two routes, 10.1.2.0/24 and 10.1.3.0/24.

B.

R2 can learn the route 10.1.1.0/24.

C.

R2 can receive the LSP of R1, but cannot add it to the routing table.

D.

R2 can learn all routes of R1.

Question 47

ISIS protocol in broadcast network and P2P network, when router receives LSP, it needs to use PSNP confirms to ensure the synchronization of LSDB.

Options:

A.

True

B.

false

Question 48

aboutRoute Policy, the following description is correct? (multiple choice)

Options:

A.

Advanced ACL can be applied to route In policy, filter routes

B.

entry pemit :: 0 less-equal 128 means allow all IPv6 routes to pass through

C.

ifMore than one node is defined in Route-policy, and at least one of each node should have a matching mode of permit

D.

Route-Policy can filter only default routes

Question 49

Two routers connected through a firewall cannot establish a BGP neighbor relationship. What is the reason?

Options:

A.

EBGP Multi-hop is not configured

B.

Firewall did not let go of IP protocol number 89

C.

Firewall did not let go of UDP port number 179

D.

BGP neighbors must form layer 2 adjacencies

Question 50

If the interface sticky MAC function is enabled, what is the number of MAC addresses learned by the interface by default?

Options:

A.

1

B.

15

C.

10

D.

5

Question 51

Regular expressions can be used toCommunity-filter and AS-path-filter define attribute types for route filtering. ( confirmed)

Options:

A.

True

B.

false

Question 52

Which of the following categories can ACL be divided into?

Options:

A.

Basic ACL

B.

Layer 2 ACL

C.

Advanced ACL

D.

User-defined ACL

Question 53

The MAC address table of the switch with default configuration is empty at this time, and the host A connected to the switch sends the first unicast data frame, then what operation will the switch perform after receiving the instruction?

Options:

A.

The switch will drop the frame

B.

The switch will record the source MAC address of the data frame and flood the data frame

C.

The switch will forward the data out an interface according to the destination MAC address of the data frame

D.

The switch will buffer the data frame and forward it after waiting for the destination host to send the data frame

Question 54

Four routers run IS-IS and have established adjacencies. The area numbers and router levels are marked in the figure. Which of the following statements is correct?

Options:

A.

R2 router's LSDB does not have R4's LSP

B.

R2 router's LSDB does not have R3's LSP

C.

R1 router's LSDB does not exist R4's LSP

D.

R3 router's LSDB does not exist R4's LSP

Question 55

The RSTP protocol provides a variety of protection functions. For example, when the edge port is configured in the protection state, the processing method after the edge port receives the BPDU message is:

Options:

A.

Obtain relevant information after parsing the BPD service

B.

Close the port

C.

Forward BPDUs as required

D.

Directly discard the BPDUs

Question 56

Level-1-2 IS will transmit Level-1 to the Level-1 area2 LSP, if Level-2 The ATT bit in the LSP is 1, which means the Level in the area-1 IS can pass Level-1-2 IS to external area

Options:

A.

True

B.

false

Question 57

When the administrator wants to manage some routes on the router during operation and maintenance, which of the following tools can mark these routes for easy management?

Admin configuration policy?

Options:

A.

If the BGP protocol is running, use the community attribute to mark the route

B.

Use ACLs to mark routes on routers.

C.

Use tagsThe value marks the route on the router.

D.

use ip-prefix in The route is marked on the router.

Question 58

RD is used to distinguish the same IP address in different VPNs. How many bits does RD contain?

Options:

A.

64

B.

32

C.

16

D.

128

Question 59

Which of the following is not the main function of NDP?

Options:

A.

Duplicate address detection

B.

Neighbor status tracking

C.

Path MTU discovery

D.

Address resolution

Question 60

Regarding the stub area in the OSPF protocol, the following statements are correct:

Options:

A.

ASBR cannot be stored in stub area.

B.

Virtual connections cannot pass through stubsarea.

C.

Type injection is not allowed in stub area7 LSA

D.

The backbone area cannot be configured as a stubarea.

Question 61

About filter-Policy is the following description correct? (single choice )

Options:

A.

Use filter-Policy, in OSPOn ASBR in F, type5 can be LSA and type7 LSAgeneration is filtered.

B.

Prefix lists can be used to filter routes as well as to filter packets.

C.

filter-policy can filter received or advertised link state information, and can modify the attributes of routing entries.

D.

When using the prefix list to filter routes, the entry ip ip-prefix 1 deny 0.0.0.0 0 less-equal 32 indicates that only the default route is matched.

Question 62

about the followingWhich RADIUS statement is true?

Options:

A.

MAC authentication does not require a user name and password, so RADIUS cannot be used to authenticate user identities.

B.

RADIUS supports both wired and wireless access methods.

C.

RADIUS protocol authentication, authorization and audit separation.

D.

RADIUS authentication and Portal authentication cannot be used together, because when Portal authentication is deployed, the Portal server can be used to authenticate users.identity.

Question 63

The network administrator plans to use the 6to4 automatic tunnel to carry IPv6 data on the IPv4 network. The IPv4 address of the router interface is 138.14.85.210, so the corresponding tunnel address is 2001:8a0e:55d2:1:230:65f.fe2:9a6

Options:

A.

True

B.

false

Question 64

If multiple candidate RPs are configured in a multicast group, which of the following parameters need to be compared to elect the RP of this group from the multiple candidate RPs?

Options:

A.

matches the address of the group the user joinedGroup-wide mask length for C-RP services

B.

C-RP priority

C.

IP address of the C-RP interface

D.

Number of the C-RP interface

Question 65

The following are about 802.1x authentication. What are the correct statements about RADIUS authentication and HWTACACS authentication?

Options:

A.

Users can use 802.1x authentication to access the network, RADIUS completes authentication.

B.

RADIUS authentication and WTACACS authentication are mutually exclusive, and dual authentication cannot be performed for the same user at the same time.

C.

RADIUS authentication and HWTACACS authentication can perform dual authentication for the same user at the same time, which is more secure.

D.

RADIUS authentication and 802.1x authentication are mutually exclusive.

Question 66

An engineer built a network topology in order to study the working mechanism of the OSPFv3 protocol. The configurations of R1 and R2 are as follows. What are the types of LSAs exchanged between R1 and R2?

R1:

ipv6 ospfv3 1

router-id 1. 1.1.1

interface GigabitEthernet0/0/0 ipv6 enable

ipv6 address auto 1ink- 1oca1.ospfv3 1 area 0.0. 0.0

R2:

ipv6 ospfv3 1

router-id 2. 2.2.2

interface GigabitEthernet0/0/0 ipv6 enable

ipv6 address auto 1ink-1oca1 ospfv3 1 area 0.0.0. 0

Options:

A.

Network-LSA

B.

Router-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Question 67

If the router's GigabitEthermet0/0/0 interface sends out 0SPFv3 The value of the Option field in the Hello packet is 0x000013. The following description is correct (multiple choice)

Options:

A.

The Gigabit/thernet0/0/0 interface of router A will participate in IPv6 routing calculation

B.

The GigabitEthernct0/0/0 interface of router A belongs toNSSA area

C.

Router A supports AS-External-LSA flooding

D.

routerA is an OSPFv3 device with forwarding capability

Question 68

As shown below,R1, R2, R3 established Level2's neighbor relationship. aboutR3's IP routing table statement is correct:

Options:

A.

The 2022::/64 route will appear in the IP routing table

B.

The 2019::/64 route will appear in the IP routing table

C.

The 2020::/64 route will appear in the IP routing table

D.

The 2021::/64 route will appear in the IP routing table

Question 69

Which scenarios can use AS-path-filter?

Options:

A.

A carried by routeSPATH attribute to filter routes received from BGP neighbors. For example the command peer xxxx as-path-fliter import

B.

Route apply clause in policy

C.

A carried by routeSPATH attribute to filter routes sent to BGP neighbors. For example the command peer xxxx as-path-ilter export

D.

if-match clause in Route-policy

Question 70

inUSG Series firewalls, Untrust. What is the security level of the zone? (single choice)

Options:

A.

50

B.

5

C.

10

D.

15

Question 71

Which properties meet the following two conditions:

BGP router A can choose toWhether the Update packet carries this attribute.

If Router B receives aAfter the Update message, Router B does not recognize the attribute, but also advertises the Update message containing this attribute to Router C. Router C may recognize and use this attribute. (multiple choice) ( confirmed)

Options:

A.

Aggregator

B.

Local-Pref

C.

Multi Exit-Disc

D.

Community

Page: 1 / 18
Total 479 questions