Question 141
Man-in-the-middle attacks or IP/MAC spoofing attacks can lead to information leakage and other hazards, and are more common in the intranet, in order to prevent man-in-the-middle attacks or IP/MAC spoofing attacks, you can take the configuration method
Question 142
What is the correct description of the scene shown in the following figure?
Question 143
Which of the following LSAs propagate in a single region only?
Question 144
In order to configure M4, you first need to define a RADIUS server, which is defined as follows:
[Huawei]radius-server template EXAM
[Huawei-radius-EXAM] radius-servers hared-key cipher HUAwei123
[Huawei-radius-EXAM] radius-server authentication 10766661812
[Huawei-radius-EXAM] radius-server authorization 1076666 1812
[Huawei-radius-EXAM] radius-server accounting 10766661813
[Huawei-radius EXAM] radius-server retransmit 2
Question 145
As shown in the figure, a company wants to achieve secure mutual access between the head office and branches through MPLSVPN, and at the same time requires that the IPN traffic of the branch bank must be forwarded through the head office to achieve traffic monitoring