Question 116
The HTTP protocol is based on TCP, so you can use the TCP Flood attack defense method to defend against HTTP Flood attacks.
Question 117
Regarding the BGP confederation, which of the following description is incorrect?
Question 118
Which of the following types of routes are used to advertise external routes in BGP EVPN?
Question 119
Which of the following is the correct description of the route priority for ISIS?
Question 120
Which of the following description of the MUX VLAN in the Huawei switch is correct?
