Which of the following statements about the working principle f LDAP FRR are true?
A. After LDP FRR enable, a backup can degenerated for a primary LSP to prevent serious packet loss during fats flapping of the primary LSP.
B. LDP TFRR can be deployed on the ingress node and the intermediate node. The primary and backup LSPas are recorded in the ILM table on the intermediate node and on the FIB table on the ingress node.
C. After LDP FRR is enabled, a backup LSP is generated both the primary and backup LSPs are stored in the forwarding table.
D. Multiple LSPs can be up on the ingress node, that is entries about multiple backup LSPs are generated in the forwarding table according to the priority of the FRR, implementing multi-layer protection.
正解:A
質問 2:
For the Eudemon firewall, the nat-policy command is configured in which mode?
A. System mode
B. Interzone mode
C. Interface mode
D. Intrazone mode
正解:A
質問 3:
Which statement about the MPLS LSP traceroute is true?
A. The egress route sends back an reply packet containing the downstream mapping TLV if the receives Echo request contains the downstream mapping TLV.
B. Echo request route sends by the LSP traceroute can cay multiple downstream mapping TLVs.
C. The downstream mapping TLV is used to carry downstream information of the correct node.
D. The destination IP address if an Echo request sent by the LSP traceroute is the IP address of the corresponding FEC.
正解:C
質問 4:
Which statement about the tunnel policy configuration is false?(A)
A. If a VPN instance does not have a tunnel policy, an LSP is used and the number of tunnels configured for load balancing is set to 1
B. You can run tunnel select-seq { gre | lsp | cr-lsp } * load-balance-number load-balance-number in the tunnel policy view to configure the priorities of tunnels and the number of tunnels among which load is balanced.
C. The tunnel policy is configured in the system view. You can run the tunnel-policy policy-name command to create tunnel policies and enter the tunnel policy view. One VPN instance supports multiple tunnel policies, and multiple VPN instances can share a tunnel policy.
D. You can run the tnl-policy policy-name command in the VPN instance view to apply tunnel policies to VPN instances. If the required tunnel policy does not exist, the configuration is saved but does not take effect. If you create this tunnel policy in the system view later, the saved configuration will take effect.
正解:C
質問 5:
The secure sockets layer (SSL) protocol mainly provides confidentiality and reliability between communication applications. It is found at the transport layer and the application layer, and provides encrypted data transmission. Which of the following protocols are required for encrypted data transmission?
A. Handshake protocol
B. Tunnel protocol
C. Record protocol
D. Alarm protocol
正解:A,C,D
質問 6:
On the IP bearer network, media and signaling packets must first be guaranteed by PQ scheduling.
The IP priority of protocol packets on the routers is 6 or 7, and these packets must also first be guaranteed. Other data packets are placed in the BE queue for scheduling. However, devices cannot be connected in inband Telnet mode if network congestion occurs. Which of the following statements are true?
A. You can improve the priority of Telnet packets and add them to the PQ queue to ensure them during network congestion.
B. The UDP port number for Telnet packets is 23.
C. Telnet packets are protocol packets and join high-priority queues by default.
D. Telnet packets are discarded during network congestion because the IP priority of Telnet packets is 0 and is scheduled in the BE queue.
正解:A,D
Okita -
この度は御社の製品を利用させてもらい、まさにお買い得なPass4TestさんのH31-161問題集だなって思