In the SDN architecture, which of the following belong to the application layer? (Choose all that apply.)
A. OpenStack
B. Third-party APP platform
C. SNC
D. NetMatrix
Which of the following is the port number used by VXLAN packets?
A. 4786
B. 4787
C. 4788
D. 4789
In the SDN architecture, which of the following protocols is used for communication between the control layer and application layer?
A. OpenFlow
B. NETCONF
C. RESTful
D. NetStream
During SDN network fault locating, which of the following commands can be used to collect basic runtime information for datacom devices?
A. display version
B. display diagnostic-information
C. display log
D. display current-configuration
Which of the following statements are true about the comparison between OSPF and IS-IS? (Choose all that apply.)
A. OSPF runs on the IP layer, and IS-IS runs on the data link layer.
B. For IS-IS, a router belongs to multiple areas, but in OSPF, a router can belong to only one area.
C. DIS election in IS-IS is simple, preemptive, and can be predicted. DR election in OSPF is unpredictable and non-preemptive.
D. OSPF supports P2P/P2MP/NBMA/broadcast networks. IS-IS supports only P2P and broadcast networks.
Which of the following statements are true about the DIS in IS-IS? (Choose all that apply.)
A. A DIS creates and updates pseudo nodes on a broadcast network.
B. DIS election is unpredictable.
C. When all IS priorities are the same within a LAN, the IS with the largest MAC address is elected as the DIS.
D. DIS election on a broadcast network is held in preemption mode.
In the SDN VXLAN solution, when an OpenFlow connection between the controller and a forwarder is torn down, the forwarder retains the static MAC address and ARP entries so that traffic can be normally forwarded.
A. TRUE
B. FALSE
Which of the following statements about NETCONF are true? (Choose all that apply.)
A. NETCONF provides a protection locking mechanism to prevent operations performed by multiple users from conflicting with each other.
B. NETCONF can query one or multiple records in a table and requires multiple interactions during this process.
C. NETCONF uses XML coding for system compatibility and extensibility.
D. NETCONF uses existing security protocols to ensure network security, and is not bound to any specific security protocols.
IN SNMP, managed devices use which of the following messages to actively send alarms to the NMS?
A. Trap
B. Inform
C. Get
D. Set
Which of the following network entities can send SNMP GetRequest packets?
A. Agent
B. Client
C. NMS