Question 96

The HTTP protocol is based on TCP, so http Flood attacks can be defended against HTTP Flood attacks using the TCP Flood attack prevention method.
  • Question 97

    Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio).
  • Question 98

    A company deployed SSM multicast, in order to save the bandwidth consumption of multicast data in the LAN, the network administrator made the following configuration on the switch
  • Question 99

    If a Huawei S series switch needs to designate a member switch as the primary switch of the stack, it can power on this switch first, and then power on other member switches after 20s.
  • Question 100

    The following statement about the VPNv4 address is wrongly described as ?