1.
On the backbone network , if a PE is connect to a CE, VPN instances need to b reconfigured on the PE, and interface on the PE for connecting to the CE must be bound to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface between PEs, IS-IS configured for PE interworking. PLSA basic capabilities and MPLS LSP are configured for LSP establishment, and MP _IBGP is configured for VPN route exchange VPN routes exchange , LDAP is short for Label Distribution Protocol, and IBGP is short for interior Border gateway protocol.
2.
A CE exchange route exchange routers with a PE over External Border gateway Protocol (EBGP.Configure interior gateway protocol (IGP) on the IS-IS+MPLS backbone networking to achieve the interworking between PEs and IP routers.
A. -4
B. -3
C. -2
D. -5
E. -1
On the OSPF network, which of the following statements about the authentication function of the OSPF protocol are true?
A. The OSPF protocol supports area authentication and interface authentication.
B. The interface authentication mode must be consistent with the area authentication mode . For Example, interface and area are authentication in simple or MDS mode or are not authenticated.
C. The interface authentication mode can be different from the area authentication mode.
D. The authentication function of the OSPF is implemented by parameter settings in hello packets.
On the BGP network, which of the following policies can be used to prevent BGP-targeted attacks?
A. Enable the BGP authentication function between BGP peers.
B. Only packets carrying the loopback IP addresses of service routers can pass through the interface, and all other packets are discarded.
C. At the outbound interface of a router, filter the TCP packets of a non-service router. The ID of the destination interface is 179 at the loopback IP address of the non-service router.
D. At the inbound interface of a router, filter the TCP packets of a non-service router. The ID of the destination interface is 179 at the loopback IP address of the non-service router
As shown in the figure , CE and CE 2 belong to VPN A, CE 3 and CE 4 belong to VPN B, VPN A and VPN B share the public network tunnels between border PE 1 and PE 2, and LDP tunnels are configured between PE 1 and PE 2. To isolate resources for VPN service data from PE 2 to PE 1, a unidirectional TE tunnel is configured t forward data from PE1. The QoS policy propagation though the border gateway protocol (QPPB) feature is configured on PE 2, and a QoS policy is defined when VPNs are bound to tunnel interfaces.
Which of the following statements about the configurations on PE 2 are true?
A. The mpls te commit command must be configured on the Tunnel1/0/0 interface,
B. The mpls te cspf command must be configured in the global MPLS view.
C. The maximum reserved bandwidth must not exceed the bandwidth of the tunnels.
D. The maximum reserved bandwidth must not exceed the bandwidth of the physical links.
E. The mpls te commit command must be configured on the Post/0/0 interface.
In the VRP, which of the following authentication modes are supported by the secure shell (SSH)?
A. password
B. Rivest-Shamir-Adleman (RSA)
C. password-rsa
D. md5
Which statement about the interworking between a VPN and the Internet is false?
A. For a VPN and the Internet to interwork, the user device used to access the Internet must have a route to the desired address on the Internet and a backhaul route.
B. A VPN and the Internet can interwork through the PE, Internet gateway, or CE.
C. A VPN and the Internet can interwork through the CE or PE.
D. For a VPN and the Internet to interwork, network address translation (NAT) must be performed. NAT can be deployed on the interface of a PE used to connect to the Internet gateway, on the interface of a PE used to connect to a CE, or on the interface of a CE used to connect to a PE.
# interface Ethernet6/1/1 ip address 40.1.1.4 255.255.255.0 igmp prompt-leaveigmp enable pim sm # IGMP interface group report information of VPN-Instance: public net Ethernet6/1/1(40.1.1.4): Total 1 IGMP Group reported Group: 224.1.2.3 Uptime: 00:00:32 Expires: 00:04:38 Last reporter: 30.1.1.30 Last-member-query-counter: 0 Last-member-query-timer-expiry: off Version1-host-present-timer-expiry: off The preceding information shows the configurations of Ethernet 6/1/1 and entries created based on
received IGMPv2 Report messages. Which action does Ethernet 6/1/1 perform after receiving Leave
messages for group 224.1.2.3?
A. Sends group-specified query messages for group 224.1.2.3.
B. Deletes the record of group 224.1.2.3.
C. Both A and B are correct.
D. Neither A nor B is correct.
If a (*, ) entry exists in the RP, Which of the following statements about the source registration are true in PIM_SM?
A. The first hop DR connecting to the source encapsulate received multicast into PIM registration information and unicast the encapsulated information to the PR.
B. The RP sends an (S, G) join message hop by hop to the first hop DR connected to the multicast source to add the multicast source to the SPT.
C. The first-hop RD connecting to the source sends received multicast data to the RP ho[p by hop.
D. The RP encapsulates registration information and uses RTP to send data packet to be sent to the multicast group to the outbound interface.
E. The RP unicast a registration stop message to the first router connection to the multicast source.
Which of the following statements describe the reliability requirements of the voice service for the IP bearer network?
A. Key modules of equipment must support active/standby switching or other redundancy backup functions.
B. The IP network uses a full/half-meshed structure and provides redundant links to strengthen the self-healing capability.
C. Link protection switching time = 50 ms
D. Link protection switching time can larger than 150 ms
On a metropolitan area network, VIP customers access the network through the MPLS VPN to ensure their security. Which of the following security deployments are required for PEs?
A. Configure the CP-CAR on the interface connected to the CE.
B. Deploy protocol authentication if a router protocol is used between PEs and CEs.
C. Configure the ACL to filter out data packets with common network viruses at the interface connected to the CE.
D. Configure the ACL to filter out IP packets that use the IP address of the CE-connected interface as the destination address.