Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

To save Ip addresses, how many bits are used in the subnet mask of the interconnection Ip

address of network devices on an enterprise work?


30

Which of the following functions can be enabled on access switches to prevent employees
from accessing small routes carrying DHCP functions?
DHCP snooping

Which of the following layers is not a medium-sized campus network?


Equipment Layer

Which Technology is used to allow only fixed users to log in to the network when you use
Telnet or Web to manage devices?
ACL

Which technologies can be implemented on a campus of network to ensure network


reliability?
All choices

What is the lifecycle of a campus network project?


All choices

Which routing protocols can be used to ensure network connectivity within a campus
network?
Static route
OSPF
ISIS

Fixed Ip addresses can be allocated to special terminals such as servers and printers.
Right

For small sized campuses the network architecture is simplified as much as possible
Right

For the centralized NMS SNMPv3 add orientations and encryption which greatly
improves NMS security
Right

Which of the following is a disadvantage of a tree network?


A node with a higher layer more serious network problems

Which type of network has the highest reliability?


Full mesh network

What are the functions of the Firewall?


Isolate networks of different security levels.
Access control between networks of different security levels
Remote access
Implement data encryption and VPN services.
Perform network address translation.

Which of the following types of networks can be classifies according to geographical


coverage?
LAN
MAN
WAN

What devices are commonly used on the network?


Switch
Router
Firewall
Wireless Controller

The start network has strong robustness and is not easy to fail
Wrong

Routers can isolate broadcast domains


Right

On a network switches and routers can be used interchangeably


Wrong

On a network a router can function as a gateway.


Right

Two computers are connected through a network cable to from the simplest network.
Right

The open System interconnections reference model divides a network into seven layers
from the bottom layer to top layer. Which of the following are the layers from bottom layer
to top layer?
Physical layer data link layer, network layer, transport layer, session layer,
presentation layer, and application layer

Which of the following port numbers is used by Telnet?


23

What are the function of the network layer?


Provide logical addresses for devices on the network
Sends packet from the sources host to the destination host
Forward data packets
Which of the following statements are correct?
Application layer: layer closest to users in the OSI reference model, providing
network services for applications.
Transport layer: provides connection-oriented or non-connection-oriented data
transfer and error detection before retransmission.
Network layer: Defines logical addresses for routers to determine paths and is
responsible for transferring data from the source network to the
destination network.
Session layer: establishes, manages, and terminates communication sessions
between presentation layer entities.

Which of the following flags in the TCP header participate in the TCP three-way
handshake?
SYN
ACK

Which of the following are valid MAC addresses?


68-F7-23-8B-33-A2
00-00-11-11-11-AA

A MAC address consist of 12 hexadecimal digits and 48 bits


Right

ARP reply packets are broadcast so that all host can receive them.
Wrong

Common data link layers protocol include Ethernet PPPo3, and PPP
Right

To disconnect a TCP connection you only need to disconnect the connection in one
direction
Wrong

Which of the following statements is incorrect?


%lt;Huawei>undo, Delete files.

How many users can manage devices the console port?


1

Storage devices include?


SDRAM
Flash
NVRAM
SD Card
USB

Which of the following functions are provided by the VRP?


Unified user interface and management interface
Implements control plane functions and defines forwarding plane interface
specifications.
Implements interaction between the forwarding plane of each product and the
VRP control plane.
Shield the differences between the link layer and the network layer of each
product.

Which of the following methods can be used to log in to the device through the CLI?
Console
SSH
Telnet

Which views are included in the commands of Huawei VRP?


User view
System view
Interface view
Protocol view

Users can manage devices using the CLI or web system


Right

The save command can be used only in the user view.


Right

The startup saved configuration file command specifies a configurations file for next
startup
Right

By default command level 0 - 3 are registered and user levels 0-15 are registered
Right

What type of Ma address does 01-00-5e-00-00-01 belong to?


Multicast MAC address

By default, what operations does the switch perform after receiving an unknown unicast
frame?
Learn the mapping between the source Mac address of the data frame and the
interface and flood the date frame

Which of the following ARP packets used to request the MAC address corresponding to
the IP address?
ARP request
Which of the following fields are contained in an Ethernet frame in the IEEE 802.3
Format?
Source MAC
Destination MAC
FCS
Length

Which of the following statement about the MAC address learning mechanism of a switch
are correct?
Mac address learning is enabled by default
The switch automatically learns the source MAC address of the packets
received by the interface
Mac address learning can be disabled on the switch

When a terminal receives a data frame, it checks the destination MAC address in the frame
header. Which of the following data frames can be received?
The destination MAC address is the local MAC address
The destination MAC address is the multicast MAC address listened by the local
devices
The destination MAC address is a broadcast MAC address

The switch floods data frames whose destination MAC addresses are unknown unicast mac
addresses and broadcast MAC addresses.
Right

The switch isolates the collision domain, and the router isolates broadcast domain
Right.

Initially the MAC address table of the switch is empty


Right

The MAC address of the devices is globally unique


Right

Which of the following 802.11 protocols can work only on the 5 GHz frequency band?
802.11ac

Which of the following VLAN IDs can be configured?


10

What CAPWAP packets does the AC use to deliver configuration files to APs?
Configure Update Response
IF the PVID of a trunk interface is 5 and the port trunk allow-pass vlan 10 20 command is
run on the interface, which VLANs can transmit traffic?
1/10/20

Which data frames us used by an AP to periodically advertise its SSID?


Beacon

Each AC needs to specify its sources IP address to establish a CAPWAP tunnel with the
AP. How many WLAN sources Ip addresses can be specified for an AC?
1

Which of the following statements about VLAN is false?


The default PVID of the port is 0
An access port can process data frames of multiples VLANs

Which of the following statement about VLAN technology are incorrect?


The VLAN technology can isolate a large collision domain into several collision
domains
PCs in different VLANs cannot communicate

Compared with 2.4 GHz, 5 GHz has the following advantages


Abundant spectrum resources and low interference
High energy and strong penetration

Which of the following measures can be taken to protect WLAN security?


Authentication
Encryption
System protection

What types of wireless networks are available in terms of coverage?


WPAN
WLAN
WMAN
WWAN

Which of the following modes can an AP dynamically discover an AC?


DHCP mode
DNS mode
Broadcast mode

A VLAN is a broadcast domain


Right
To restrict the access off a specific host to specific resources you can configure VLANs
based on MAC addresses
Right

The CAPWAP tunnel establishes two tunnels: The data tunnel and the control tunnel.
Keepalive packets are used for keepalives regardless of the tunnels
Wrong

The AP needs to be authenticated when it goes online. The authentication modes include
MAC address authentication and SN authentication.
Right

The bridge IDs of SW1, SW2, SW3, and SW4 are 4096.4c1f-11bc-102a,4096.4c1f-aabc-
102b, 4096.4c1f-aabc-001a, and 8192.4c1f-aabc-112b, if four switches are on the same layer
2 network and STP is enabled, which of the following is the root bridge?
SW3

By default, the forward delay of STP is?


15s

Which of the following statements about designated ports are correct?


All ports on the root bridge are designated ports.

The root bridge ID, bridge ID, interface Id, and root path cost (RPC) are four important
fields for configuring BPDU priorities. Which of the following is the preferred sequence for
configuring BPDUs on a switch?
Root Bridge ID, RPC bridge ID, and Interface ID

Which of the following fields are contained in a BPDU configuration?


Root ID
Port ID
Bridge ID
Forward Delay

Which of the following statement about the STP root port are correct?
Non-Root bridge can have only one root port
The root port is a non-root bridge port used to received BPDUs

By default the STP mode of the switch is RSTP.


Wrong

Non- root bridges in STP can also actively send configuration BPDUs
Wrong

You can manually set the priority of the switch BID to 1000.
Wrong
Generally it takes 50 seconds to restore a root bridge fault and 30 seconds to restore a
direct link fault
Right

What is the default priority of an LACP interface?


32768

Which of the following interface configuration parameters does not require the same
configuration of the member interface in a an aggregation group?
Spanning tree configuration

Which of the following statement about active link election in LACP mode is false?
The actor enables the active interface and disables in the inactive interface. The
actor informs the peer of the election result through the physical interface
status.

Which link aggregation mode can implement link backup on Huawei Switches?
Static LACP mode

Which of the following modes is used to send LACP packets to the peer end? ()
Multicast

Which of the following fields is used to select the Actor in the LACPDU?
Device priority
Device MAC address

Which of the following physical parameters must be consistent at both ends of an Ethernet
trunk link
A number of aggregated links
Rate of the aggregated links
Duplex mode of the aggregated links

To ensure the minimum bandwidth you can set the minimum number of active interface in
a link aggregation group
Right

Two devices form a cluster and are virtualized into a single logical device. The simplified
networking does not require protocols such as MSTP and VRRP, simplifying network
configurations. In addition, inter-device link aggregation implements fast convergence and
improves reliability
Right

A cluster supports only two devices


Right
Which of the following IP addresses are private IP addresses?
172.17.1.254

What is the number of available IP addresses in the 172.16.0.0/30 network segment?


2

If the network address of a company is 192.168.1.0.24, which of the following network


mask is applicable to six subnets with a maximum of 20 host in each subnet?
27

If the IP address of a port is 202.16.7.145/26, which of the following broadcast addresses is


the network where the IP address reside?
202.16.7.191

In IPv4, what type of address is a multicast address?


Class D

Which of the following packets is used by ICMP to detect the connectivity between the
sources and destination Ip addresses?
ICMP Echo

Which of the following IP addresses can be manually configured and used by host
interfaces?
10.2.3.4
192.168.100.254

When the TTL field of an IP packet is 0, the router discards the packet
Right

9.172.16.1.0/16 is an available IP address


Right

ICMP Defines various error messages for diagnosing network connectivity problems. Base
on the error messages, the sources device may determine the cause of the data transmission
failure.
Right

Run the display IP routing table command to check the IP routing table. Which of the
following is not included in the command output?
advRouter

What is the default priority of a static route?


60

When a device learns two routes to the same destination, which of the following parameters
is used to distinguish the routes?
Priority

According to the longest match principle, which of the following routes does not packet
with the destination Ip address 172.16.10.1 match?
172.16.10.0/24

Which of the following routing protocols is a link state routing protocol?


OSPF
IS-IS

Which of the following are the sources of routing information?


Direct route
Static routing protocol
Dynamic routing protocol

Which of the following protocols are internal gateways protocols?


RIP
ISIS
OSPF

172.16.1.0/24, 172.16.2.0/24 and 172.16.5.0/25 can be aggregated into 172.16.0.0/22


Wrong

When forwarding a packet, the router discards the pacers if no specific route is found and
no default route is available
Right

When forwarding a packet a router can forward the packet based on the source address
Wrong

Which packets are used by OSPF to discover and maintain neighbor relationship.
Hello

By default what is the OSPF cost of a 1.544 Mbit/s serial interface, FE interface, or GE
interface
64,1,1

Which of the followings entries is used by OSPF to store link status information?
OSPF LSDB
Which of the following statements about the router ID is OSPF are correct?
The prerequisites for the normal running OSPF is that the router has the router
ID

OSPF supports multiple processes. If no process ID is specified, which process Id is used by


default
1

Which of the following network types are supported by OSPF?


P2P
P2MP
NBMA
Broadcast

Which network types do OSPF need to be selected as DR and BDR?


NBMA
Broadcast

On a broadcast network, the final status of DRs between others is 2-ways and does not
enter the full state.
Right

On an OSPF network, area 0 is the backbone area.


Right

OSPF devices can establish neighbor relationship across multi-hop devices


Wrong

Compared with IPv4, IPv6 has a large number of address spaces. What is the length of an
IPv6 address?
128

IPv6 address: Which of the following is the abbreviation of


2001:0AF8:0000:1234:FB00:0000:5000:EF14?
2001:AF8:0:1234:FB00::5000:EF14

Compared with the IPv4 header, which of the following fields is added to the IPv6 basic
header?
Flow Label

Which of the following is the prefix of a link-local address?


FE80::/10
If the MAC address of a device is 5489-98C8-1111, what is the link-local address of the
device?
FE80::5689:98FF:FEC8:1111

According to the IPv6 address prefix, the IPv6 address can be .


Unicast address
Multicast address
Anycast address

An IPv6 unicast address consists of a network prefix and an interface identifier. Common
IPv6 unicast addresses, such as global unicast addresses and link-local addresses, must be
64 bits.
True

The link-local address cannot be manually configured.


False

IPv6 uses ICMPv6 NS and NA packets to replace the IPv4 address resolution function of
ARP.
True

When IPv6 uses stateless address autoconfiguration, information such as domain names
can be obtained.
False

To implement inter-VLAN communication through sub-interfaces, which of the following


commands needs to be configured on sub-interfaces to terminate VLANs?
dot1q termination vid vlan-id

When using a one-armed router to implement inter-VLAN communication, sub-interfaces


instead of physical interfaces are commonly used. Why?
Sub-interfaces can save physical interfaces.

Which of the following statements about a Layer 3 switch is false?


Layer 3 switches can only forward packets at Layer 3 but cannot forward packets at
Layer 2.

Which of the following statements about routing and forwarding of Layer 3 switches is
incorrect?
Based on the routing table, the Layer 3 switch directly forwards the packet to the
next hop without re-encapsulating the data frame.
Which of the following types of interfaces can be used to implement inter-VLAN
communication through sub-interfaces?
Trunk
Hybrid

During Layer 3 communication, the source and destination MAC addresses are replaced
each time the packets pass through a Layer 3 device.
True

The Layer 3 switch can properly connect to the router and run a dynamic routing protocol.
True

By default, a sub-interface for VLAN tag termination is not enabled with ARP broadcast
and cannot forward broadcast packets. To allow the sub-interface to forward broadcast
packets, run the arp broadcast enable command on the sub-interface.
True

On a Layer 3 device, you can run the undo port switch command to change a Layer 2
interface to a Layer 3 interface.
True

Layer 2 interfaces do not have MAC addresses, but Layer 3 interfaces have MAC
addresses.
True

Which of the following 802.11 protocols can work only on the 5 GHz frequency band?
802.11ac

What CAPWAP packets does the AC use to deliver configuration files to APs?
Configuration Update Response

Which data frame is used by an AP to periodically advertise its SSID?


Beacon

Each AC needs to specify its source IP address to establish a CAPWAP tunnel with the AP.
How many WLAN source IP addresses can be specified for an AC?
1

Compared with 2.4 GHz, 5 GHz has the following advantages:


Abundant spectrum resources and low interference
High energy and strong penetration
Which of the following measures can be taken to protect WLAN security?
Authentication
Encryption
System protection

What types of wireless networks are available in terms of coverage?


WPAN
WLAN
WMAN
WWAN

Which of the following modes can an AP dynamically discover an AC?


DHCP mode
DNS mode
Broadcast mode

The CAPWAP tunnel establishes two tunnels: the data tunnel and the control tunnel.
Keepalive packets are used for keepalive regardless of the tunnels.
False

The AP needs to be authenticated when it goes online. The authentication modes include
MAC address authentication and SN authentication.
True
What is the default step for ACL rule IDs?
5

What is the number range of an advanced ACL?


3000-3999

If the number of an ACL is 4010, which of the following fields can the ACL match?
Source and destination MAC addresses and Layer 2 protocol types

An AR2220 router uses the following ACL configuration to filter data packets. Which of
the following statements is correct? [RTA]acl 2001 [RTA-acl-basic-2001]rule permit source
10.0.1.0 0.0.0.255 [RTA-acl-basic-2001]rule deny source 10.0.1.0 0.0.0.255 [RTA-acl-basic-
2001]rule permit source 10.0.1.0 0.0.0.3
Packets on the 10.0.1.0/24 network segment will be rejected

Which of the following statements about ACL application scenarios is false?


ACL can be applied to LACP.
ACL rule: rule 1 permit tcp source any destination 192.168.1.1 0.0.0. 0 destination-port eq
80, What is the matched packet?
Source IP address: 10.0.0.1; destination IP address: 192.168.1.1; source port
number: 30000; destination port number: 80; transport layer protocol: TCP
Source IP address: 10.1.1.1; destination IP address: 192.168.1.1; source port
number: 62012; destination port number: 80; transport layer protocol: TCP

The following ACLs are used on RTA to match route entries, which of the following
network traffic will be denied? [RTA]acl 2002 [RTA-acl-basic-2002]rule deny source
172.16.1.1 0.0.0.0 [RTA-acl-basic-2002]rule deny source 172.16.0.0 0.0.255.255 [RTA-acl-
basic-2002]rule permit source any
172.16.1.1/32
172.16.1.0/24
172.16.0.0/24

An advanced ACL can match the source and destination port numbers of packets and filter
TCP packets with a specified destination port number.
True

The command rule permit source 192.168.1.0 0.0.0.254 is used to match all Even IP
addresses in the network segment.
True

If ACL 3500 is manually configured on a device, the ACL cannot be used to control the
source and destination port numbers.
False

Which of the following components is not included in a common AAA network


architecture?
Portal Server

Which of the following are the transport layer protocols and authentication port numbers
used by RADIUS?
UDP,1812

Which of the following authorization modes does the AAA support?


Mutual authorization

What are the abbreviations of AAA?


Authentication
Authorization
Accounting

If the Telnet service has been configured on the network device, but the user cannot
remotely access the network device, what are the possible causes?
The network device is unreachable.
The password entered by the user is different from the password configured on the
AAA server.
The number of Telnet users has reached the maximum limit.

When receiving a network access request from a user, the NAS determines the domain to
which the user belongs based on the user name and controls the user based on the AAA
scheme corresponding to the domain.
True

If a common user for local authentication is not associated with a user-defined domain, the
user belongs to the default domain.
True

By default, the AAA authentication mode is local authentication.


True

The AAA accounting mode is non-accounting, local accounting, and remote accounting.
False

Both RADIUS and HWTACACS can implement authentication, authorization, and


accounting.
True

Which of the following address translation technologies can use only the current address of
an interface as the public address for NAT?
Easy IP

Which NAT technology can be deployed on egress network devices to allow external users
to access a TCP port on the internal server?
NAT Server

The following [R1-GigabitEthernet0/0/1]nat outbound 2000 address-group 1 Which of the


following statements about the configuration command is incorrect?
In this command, outbound can be changed to inbound.
NAPT allows multiple private IP addresses to be mapped to the same public IP address
through different port numbers. Which of the following statements about port numbers in
NAPT are correct?
No port number configuration is required.

Which of the following is not included in source address translation by NAPT?


Destination port number
Destination IP address

Which of the following NAT technologies can be used to enable external users to
proactively access a server on the intranet?
Static NAT
NAT Server

Which of the following are private IP addresses?


10.1.1.1
172.16.1.1
100.1.1.1
192.168.3.1

NAPT not only translates IP addresses but also port numbers to implement 1:n mapping
between public addresses and private addresses.
True

By default, Easy IP will not translate port numbers.


False
When configuring dynamic NAT, you need to configure ACL traffic to control whether
traffic can pass through the device.
False

What is the domain name level of ‘.com’ in the URL: ‘www.huawei.com’?


Top-level domain name

Which of the following packets does the DHCP server use to carry the IP address assigned
to the client during DHCP interaction?
DHCP Offer

What is the default destination port number of the FTP control channel?
21
After a DHCP client receives a DHCP ACK packet, which packet does the DHCP client
send to the DHCP server if it finds that the IP address to be used already exists on the
network?
DHCP Decline

Which of the following FTP commands should be used to download files from the FTP
server on the router?
get

Which of the following parameters can be allocated by the DHCP server to the client?
DNS server address
Gateway address
Local IP address
Mask
Next
Which of the following DHCP packets are broadcast?
DHCP Discover
DHCP Request

The FTP working mode can be active or passive. TCP port 20 is used in both modes.
False
FTP uses TCP for transmission, and TFTP uses UDP for transmission.
True

In the NTP network structure, the number indicates the clock precision. The value 1
indicates the highest clock precision, and the value 15 indicates that the clock is not
synchronized.
True

Which packets are used by PPPoE to interrupt sessions?


PADT

If a packet with mismatched parameters is received during LCP negotiation, which packet
is used by PPP to respond?
Configure-Nak

What is the function of the ip address ppp-negotiate command?


Enable the function of requesting IP addresses from the peer end.

On a multipoint access network such as Ethernet, the PPPoE server can set up PPP
connections with multiple PPPoE clients through one Ethernet port. Therefore, the PPPoE
server must set up a unique session identifier for each PPP session to distinguish different
connections. What parameters are used to establish a session identifier for PPPoE?
MAC address and session ID

During the establishment of a PPP session, when the physical layer is available, what phase
does the PPP link enter?
Establish

Which of the following packets is broadcast?


PADI

What authentication protocols are supported by PPP authentication?


PAP
CHAP

Which of the following packets are used during PPP negotiation?


LCP
PAP
CHAP
IPCP

What parameters are negotiated during PPP link layer negotiation?


MRU
Authentication
Magic number

During CHAP authentication, the password configured for a user is carried in plain text in
PPP packets.
False
Next
Which of the following packets is used by SNMPv2c to proactively send alarms to the NMS
and require the NMS to respond explicitly?
Inform

Compared with SNMPv1, SNMPv2c uses which of the following packets to query OID
information in batches?
GetBulk

Which of the following are the attributes of managed devices defined in the MIB database?
OID
Object status
Object access permission
Data type of the object

Compared with SNMPv1 and SNMPv2c, SNMPv3 has the following security features:
Supports user authentication using the MD5 algorithm.
Data encryption using des is supported.

Which of the following are NETCONF objects?


NETCONF client
NETCONF server
NETCONF message

Network devices with SNMP enabled run the Agent process. The NMS management
process interacts with the Agent process through SNMP packets.
True

YANG is a data modeling language.


True

NETCONF establishes secure connections based on Secure Shell (SSH) or Transport Layer
Security (TLS).
True

After NETCONF is used, SNMP can be abandoned on the live network.


False

Huawei iMaster NCE is a network automation and intelligence platform that integrates
management, control, analysis, and AI functions.
True

Which of the following modules is responsible for virtualization of underlying hardware


infrastructure in the standard NFV architecture?
NFVI

In the SDN architecture, which of the following interfaces is used to communicate with
SDN switches?
SBI

In the OpenFlow architecture, which of the following are the types of packets sent from the
controller to the switch?
Controller-to-Switch
Symmetric

Which of the following are NFV features?


Partition
Isolation
Encapsulation
Independent from hardware

Which of the following features are characteristics of an SDN network?


CU separation
Centralized control
Development interface

Which of the following are SDN network architectures?


Collaboration application layer
Control layer
Device layer

What are the benefits of NFV to carriers?


Shorten service rollout time
Reduce network construction costs
Improve network O&M efficiency
Build an open ecosystem

An OpenFlow switch forwards packets based on flow tables. In addition to the destination
MAC address and destination IP address, multiple fields can be used to match packets.
True

SDN and NFV technologies are the development trends of current networks. The two
technologies are inseparable.
False

NCE integrates the functions of traditional eSight, Agile Controller, and analyzer.
True

To improve code modularity and code utilization, we can use classes to describe a set of
properties and methods of the same type. The keyword for defining a class is?
class

Which of the following methods is used to write data in the Telnetlib module?
write()Ne

What types of characters are supported by Python identifiers?


Letter
Digit
Underscore
What are the advantages of Python?
Elegant syntax and dynamic types are explanatory.
Process-oriented and object-oriented programming.
Abundant third-party libraries.
Code written in other languages can be invoked.

Which of the following high-level programming languages are compilation-type?


C
C++

Which of the following categories can computer languages be classified according to


language levels?
Machine language
Assembly language
High-level language

In Python programs, code indentation represents the scope of code blocks. If a block of
code contains two or more statements, the statements must have the same indentation.
True

Java and Python are interpretative languages.


True

In Python, relational operators can be used consecutively. For example, 2<3<4 is


equivalent to 2<3 and 3<4.
True

The Python program written on the Windows platform cannot run on the Unix platform.
False

To save IP addresses, how many bits are used in the subnet mask of the interconnection IP
address of network devices on an enterprise network?
30

Which of the following functions can be enabled on access switches to prevent employees
from accessing small routes carrying DHCP functions?
DHCP Snooping

Which of the following layers is not a medium-sized campus network?


Equipment layer
Which technology is used to allow only fixed users (IP addresses) to log in to the network
when you use Telnet or Web to manage devices?
ACL

Which technologies can be implemented on a campus network to ensure network


reliability?
iStack
CSS
VRRP
Link aggregation

What is the lifecycle of a campus network project?


Planning and design
Deployment and implementation
Network O&M
Network optimization

Which routing protocols can be used to ensure network connectivity within a campus
network?
Static route
OSPF
ISIS

Fixed IP addresses can be allocated to special terminals, such as servers and printers.
True

For small-sized campuses, the network architecture is simplified as much as possible.


True

For the centralized NMS, SNMPv3 adds authentication and encryption, which greatly
improves NMS security.
True

Next

Next
Next

You might also like