Which of the following aspects should be considered for migration risk assessment? (Multiple Choice)
Key risk positions
Risk impact scope
Risk impact time
Loss caused by risks
A large-scale network migration project can be divided into multiple small migration tasks that are relatively independent but also associated with each other.
TRUE
FALSE
In the fault determining and analysis phase of the structured network troubleshooting process, summarizing the fault, maintenance, and change information can obtain a network fault cause list.
TRUE
FALSE
Which of the following scenarios is a loop test applicable to?
To test whether applications are properly connected
To test whether a routing protocol can prevent loops
To test whether a switch can prevent loops and broadcast
To test whether a physical link is disconnected
Currently, to which of the following modes does network design conform? (Multiple Choice)
Modular
Automatic
Hierarchical
Modern
Standard
If you can ping the peer host successfully, which of the following methods is the most appropriate for subsequent troubleshooting?
Configuration comparison
Bottom-up
Service traffic path check
Top-down
Which of the following work is not prepared before the migration?
Hardware test
Software test
Expenses
Tools
After the connection is completed, what items are generally required to be checked?
Data flow
Indoor topology
Software version
Control plane entries
On a Layer 2 switching network devices forward data based on MAC addresses. Therefore, data filtering can be performed based on MAC addresses, and a firewall in transparent cannot filter out Layer 3 information in data packets.
TRUE
FALSE
Which of the following causes may result in a BGP peer relationship fault? (Multiple Choice)
An ACL is configured to disable TCP port 179.
The peer router ID conflicts with the local router ID.
The peer ebgp-max-hop command is not configured when loopback interfaces are used to establish the EBGP peer relationship.
The peer connect-interface command is not configured when loopback interfaces are used to establish the BGP peer relationship.