Which of the following link types may appear in OSPF Router-LSAs?
On a router, SRv6 is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?
[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32
IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.
Which of the following are potential risks in HTTP communication?
The IS-IS Level-1 neighbor relationship is not established between R3 and R4. Referring to the following information, what is the possible cause?
An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.
During the configuration of L3VPNv4 over SRv6 BE, if an RR is deployed in the SR domain, which command must be run on the RR to ensure that the PEs at both ends can correctly learn VPNv4 routes?
A network administrator needs to retrieve a token ID from iMaster NCE using the following Python code:
python
CopyEdit
import requests
nbi_name = "demol3@north.com"
nbi_pwd = "qqcOVcVel@"
host = "139.9.213.72"
port = "18002"
URI = "/controller/v2/tokens"
post_token_url = " " + host + ":" + port + URI
headers_post = {'Content-Type': 'application/json', 'Accept': 'application/json'}
r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=incorrect)
Which of the following statements is incorrect?
Which of the following statements is incorrect about Authentication Header (AH)?
Which of the following statements is correct about 6PE and 6VPE?
Which of the following user logout modes are supported by 802.1X authentication?
In the firewall hot standby scenario, in which of the following conditions will the local device proactively send VGMP packets?
The on-premise mode is recommended for controller deployment on small and midsize campus networks.
In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, run the command on the VTEP to view BGP EVPN routes. The route entries shown in the following figure are displayed. Which of the following statements about these routing entries are correct?
Network (EthTagId/IP Prefix/IP PrefixLen)
NextHop
*>i 0:172.16.2.0:24 1.1.1.2
*>i 0:172.16.13.0:24 1.1.1.2
*>i 0:192.168.122.0:30 1.1.1.2
The NETCONF content layer contains device configuration data.
Which of the following statements are correct about the following NETCONF configuration?
In the figure, SR-MPLS is enabled on R1, R2, and R3. The SRGB (Segment Routing Global Block) range on R3 is from 20000 to 21000, and the prefix SID index configured on the loopback1 interface of R3 is 30.
In this case, the MPLS label corresponding to the loopback1 interface of R3 is _____.
(Enter an Arabic numeral without symbols.)
An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?
As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.
Which of the following statements are correct about how a PE processes the packet?
In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?
The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.
To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?
In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?
Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?
In Huawei Open Programmability System (OPS), /ifm/interfaces/interface is the URL used to identify a device's managed object.
With telemetry, certain data can be sampled based on specific sampling paths. Which of the following sampling paths are supported by telemetry?
Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.
gRPC (Google Remote Procedure Call) is a language-neutral, platform-neutral, and open-source remote RPC system that supports unary RPCs and streaming RPCs.
Which of the following service methods are NOT supported by gRPC?
When static IPsec VPN is used for WAN interconnection in the Huawei CloudCampus Solution, the AP, Router, and ____ can be used as egress devices.
Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?
After the reset isis all command is run, the specified IS-IS process is reset, and all involved IS-IS neighbor relationships are re-established; however, IS-IS statistics are not cleared.
Which of the following types of EVPN routes does not carry MPLS labels?
Which of the following functions can be provided by iMaster NCE-Campus when it functions as a relay agent for authentication?
Exhibit:
A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?
Collecting information before a cutover helps you determine whether services are normal before and after the cutover.
Which of the following statements does not cause the flapping of a VRRP group?
Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.
Refer to the output information of a device below. According to the information, which of the following MPLS labels is carried in a data packet forwarded by the device to 10.0.1.1?
Which of the following statements about IPSG is incorrect?
Python Paramiko implements the SSH protocol. In the Python Paramiko module, which of the following classes is used to create SFTP sessions and perform remote file operations?
Which of the following items are included in static information collection and analysis?
Which of the following roles is NOT a core role in Huawei's Free Mobility solution?
The figure shows a packet that contains three label headers. Select the values (in decimal notation) of the X, Y, and Z fields, respectively.
Which of the following commands is used to adjust the cost of an IS-IS interface?
In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.
OSPFv2 is an IGP running on IPv4 networks, whereas OSPFv3 is an IGP running on IPv6 networks. OSPFv2 and OSPFv3 have similar LSA types, but their LSA functions are slightly different. Which of the following is not an OSPFv3 LSA type?
An SR-MPLS Policy needs to divert service traffic to a tunnel for forwarding. If traffic from various services is destined for the same address, which of the following traffic diversion modes is recommended to ensure the quality of each service?
The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?
iMaster NCE-Campus provides the terminal identification function to display the terminal type, operating system, and manufacturer information.
Refer to the figure.
Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?
The figure shows an L3VPN over an SRv6 BE (Best Effort) network. According to the information displayed on PE2, which of the following statements is incorrect?
What can be determined from the following IS-IS peer output?
Peer information for ISIS(1):
Peer System ID: ee8c.a0c2.baf3
Interface: GE0/0/0
State: Up
HoldTime: 7s
Type: L1
PRI: 64
MT IDs supported: 0(UP), 2(UP)
Local MT IDs: 0, 2
Area Address(es): 49.0022
Peer IP Address(es): 10.1.34.1
Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576
NETCONF uses an XML-based encoding format. NETCONF uses text files to represent complex hierarchical data. Which of the following statements are correct about the following XML file?
Which of the following statements about SR-MPLS Policy candidate paths are correct?
When an SSH client logs in to an SSH server that is configured only with username and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).