Question 136

According to this picture, we can judge:
  • Question 137

    An engineer uses two routers to test IPv6 services, and simulates the interconnection between the headquarters and branches by running BGP4+.


    As shown in the figure, an engineer captures the packet to view the update message sent by R1. Regarding the description of the message information, which of the following statements is correct?
  • Question 138

    The routing policy tools that BGP can use mainly include Filter-policy and Route-policy, of which Fiter-policy can only filter routes, and Route-policy can only modify routes.
  • Question 139

    Man-in-the-middle attacks or IP/MAC Spooping attacks can lead to information leakage and other hazards, and are more common in the intranet. To prevent man-in-the-middle attacks or IP/MAC Spooping attacks, which of the following configuration methods can be taken.
  • Question 140

    Which of the following options are there for the conditions for the firewall security policy to match traffic? (Multiple choice)