Question 91

On a P2P IS-IS network, after a neighbor relationship is established between R1 and R2, R2 finds that its LSDB is not synchronized. Then, R2 requests corresponding LSPs from R1 for LSDB synchronization. The following figure shows the synchronization process. Drag the following packet types to the steps in which they are used.(Token is reusable)

Question 92

BGP is generally applied to complex networks where routes change frequently. Frequent route flapping consumes a large number of bandwidth and CPU resources, and even affects the normal operation of the network. This is an unavoidable problem that cannot be solved in BGP.
  • Question 93

    On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?
  • Question 94

    Hackers often obtain the login permissions of system administrators through various attacks.
    Which of the following measures can be taken to enhance the security of administrator accounts?(Select all that apply)
  • Question 95

    Which of the following is the default interval at which the DIS on a broadcast IS_IS network sends CSNPs.