Question 96
The HTTP protocol is based on TCP, so http Flood attacks can be defended against HTTP Flood attacks using the TCP Flood attack prevention method.
Question 97
Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio).
Question 98
A company deployed SSM multicast, in order to save the bandwidth consumption of multicast data in the LAN, the network administrator made the following configuration on the switch
Question 99
If a Huawei S series switch needs to designate a member switch as the primary switch of the stack, it can power on this switch first, and then power on other member switches after 20s.
Question 100
The following statement about the VPNv4 address is wrongly described as ?