01. Which statement about the STP protocol is correct?
a) STP is mainly used in token ring networks
b) STP is used to construct the shortest path between two nodes in the LAN
c) When the active link fails, STP can activate the redundant link and restore network connectivity
d) STP is used to eliminate data link layer loops in LAN
02. SOA-based network architecture divides the enterprise IT system into which of the following levels?
(choose one or more)
a) Infrastructure layer
b) Network layer
c) Session layer
d) Application layer
03. Which of the following statements about multicast VLAN is correct is?
a) Multicast VLAN not only saves bandwidth, but also reduces the burden on Layer 3 devices
b) The VLAN that the host belongs to needs to be configured as a sub-VLAN of the multicast VLAN
c) Multicast VLAN needs to enable IGMP-Snooping function
d) The sub-VLANs of the multicast VLAN must also enable the IGMP-Snooping function
04. The SSH protocol is widely used as a secure remote login protocol. What is correct about SSH is _______?
a) SSH uses TCP port 22 to transmit data and port 23 to establish a connection
b) SSH can also provide a secure transmission channel for FTP
c) SSH and Secure Shell can use DES authentication to ensure data security
d) SSH uses additional encryption technology to ensure login security
05. What kind of request operation does SNMP v2c add to the SNMP v1 protocol?
a) SetRequest
b) GetBulkRequest
c) GetNextRequest
d) GetRequest
06. Since the expansion of the network scale may lead to more and more arduous management tasks, in the initial stage of network construction, network administrators hope to adopt various technologies to reduce the workload of network management.
The most common method is to simplify the network structure and unify Network equipment and other methods. Which of the following technologies are technologies that simplify the network structure?
a) SNMP protocol
b) Cluster technology
c) Stacking technology
d) 10 Gigabit Etherne
07. Which of the following statements about SNMP v3 architecture is correct is _____.
a) SNMP engine includes scheduler, message processing subsystem, security subsystem and access control subsystem
b) SNMP application includes command generator, command responder, instruction generator, proxy forwarder, etc.
c) SNMP Manager either has a command generator or an instruction receiver
d) An SNMP entity may be both SNMP Manager and SNMP Agent
08. The topology is shown in the figure, and the STP calculation is performed. The correct result is?
a) The port E0/2 of SWA is an alternate port
b) SWA ports E0/1 and E0/2 are designated ports
c) SWD port E0/1 is the root port
d) Both ports E0/1 and E0/2 of SWD will receive configuration BPDUs
09. Before configuring Layer 3 multicast, the first configuration that needs to be done is?
a) Enter IGMP view
b) Enable multicast globally through the multicastrouting-enable command
c) SB sets the IGMpi protocol version
d) Configure PIM protocol
10. When the router receives the multicast data, it searches the multicast forwarding table?
a) If there is a corresponding (S, G) entry in the multicast forwarding table, and the interface actually reached by the packet matches the inbound interface in the entry, the router forwards the multicast data
b) If the multicast data RPF interface does not match the inbound interface in the (S, G) entry, the router will update the inbound interface of the entry to the checked RPF
c) If the corresponding (S, G) entry does not exist in the multicast forwarding table, the router discards the multicast data
d) If there is a corresponding (S, G) entry in the multicast forwarding table, but the interface that the packet actually reaches does not match the inbound interface in the entry, the router discards the multicast data