Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

Note! Following H12-261_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-261_V3.0 HCIE-Routing & Switching (Written) V3.0 Questions and Answers

Questions 4

As shown in the figure, which of the following options can satisfy two routers to establish an ISIS neighbor relationship?

Options:

A.

Both routers are Level-1type.

B.

Both routers remain the default type.

C.

One of the two routers can be a Level-1-2 type, and the other can be a Leve1-1 type.

D.

ISIS with two routersProcess IDs must be the same.

Buy Now
Questions 5

Regarding the authentication of the ISIS protocol, the correct statement is:(multiple choice)

Options:

A.

Interface authentication can be used to authenticate Level-1 and Level-2 hello packets

B.

After interface authentication is configured, the IIH sent by the router must carry the authentication TL.V

C.

After configuring the area authentication, the IIH, S sent by the routerNP, LSP must be connected with certified TLV

D.

If the two routers are configured for area authentication and interface authentication respectively, and the passwords are the same, the two routers can establish a neighbor relationship.

Buy Now
Questions 6

Which of the following Hello packets is not included in the IS-IS protocol?

Options:

A.

Level-2 LAN IIH

B.

P2MP IIH

C.

P2P IIH

D.

Level-1 LAN IIH

Buy Now
Questions 7

When the BFD detection time intervals at both ends are 30ms and 40ms respectively. Which of the following options is correct?

Options:

A.

bfdSession can be established, after negotiation 40ms

B.

bfdSession can be established, after negotiation 30ma

C.

bfdSession can be established. each at its own time interval

D.

bfdSession could not be established

Buy Now
Questions 8

in MPLS-In the case of IBGP-VPN, if only BGP and LDP are used to distribute labels, the MPLS labels of packets can be up to two layers of labels.

Options:

A.

True

B.

false

Buy Now
Questions 9

Which of the following statements about MUX VLAN are correct? (Multiple choices)

Options:

A.

The principal VLAN can communicate with all VLANs in the MUX VLAN

B.

Separate VLAN can and MUX VLAN all vla insiden Communication

C.

Each Group VLAN must bind a principal VLAN

D.

Each separate VLAN must bind a principal VLAN

Buy Now
Questions 10

BGP4+ is running between the two routers, and the neighbor relationship is normal, but the BGP routing table of the local router does not have any neighbor routing entries. The following possible reasons are:

Options:

A.

The routing entry in the peer BGP routing table is not optimal.

B.

The next hop address of the BGP route entry is unreachable?

C.

The peer is configured with peer ignore

D.

The peer is configured with active-route-advertise

Buy Now
Questions 11

Between two directly connected devices that have established IBBP neighbors, run the shutdown command to shut down the interface of one of the devices, and the BGP connection will not be disconnected immediately.

Options:

A.

True

B.

false

Buy Now
Questions 12

Which of the following statements about OSPF route calculation is false

Options:

A.

Compared to PRC algorithm, ISPF algorithm only calculates the changed leaf nodes when the route changes

B.

When the type-3, type-5 or type-7 LSA changes on the network, the PRC algorithm is used to recalculate the route

C.

When the Type 1 and Type 2 LSAs on the network change, the OSPF uses the ISPF algorithm to recalculate the route

D.

OSPF routers use the FULLSPF algorithm to calculate all nodes in the network when initially calculating routes

Buy Now
Questions 13

Which of the following parameters is not a configuration BGP PeeA must for r?

Options:

A.

description

B.

as-number

C.

peer's IP Address

D.

password

Buy Now
Questions 14

Which of the following attacks areDoS ( Denial of service) attack?

Options:

A.

single packet attack

B.

Source IP address spoofing attack

C.

man-in-the-middle attack

D.

flood attack

Buy Now
Questions 15

How 802.1w and 802.1D handle BPDU's? ( confirmed)

Options:

A.

802.1D bridges only forward BPs received from the root bridgeDU message

B.

802.1D bridge will not forward BPDU message

C.

802.1The w bridge only forwards BPDUs received from the root bridge

D.

802.1w Bridges do not forward BPDUs

Buy Now
Questions 16

Which of the following advanced features does BGP EVPN support?

Options:

A.

ARP broadcast suppression

B.

VRRP over VXL AN

C.

Multi-active gateway

D.

VXL AN Qos

Buy Now
Questions 17

For the description of the firewall security zone, which of the following statements is correct? (single choice)

Options:

A.

The firewall's own security zone can be deleted

B.

The same interface of the firewall can belong to different security zones

C.

Different security zones of the firewall can have the same priority

D.

Different interfaces of the waterproof wall can belong to the same security area

Buy Now
Questions 18

Which of the following regular expressions can match only the BGP routing entries that pass through AS200 and then through AS300?

Options:

A.

_[200 300]_

B.

200$|300$

C.

^200|^300

D.

_(200 300)_

Buy Now
Questions 19

OSPIn Fv3, the Router-LSA is generated for each router, which describes the interface address and cost of each link of the router, and also includes the RouterID of the neighboring router.

Options:

A.

True

B.

false

Buy Now
Questions 20

If the network runs the OSPF protocol, configure the non-backbone area in the OSPF area as Totaly After the stub area, ABThe R router will send Totally An L is delivered to the stub areas Id 0.0.0.0 LSA, which type of LSA does this LSA belong to??

Options:

A.

LSA3

B.

LSA1

C.

LSA5

D.

LSA2

Buy Now
Questions 21

Which of the following statements about digital certificates is false?

Options:

A.

Digital signatures guarantee the integrity of digital certificates.

B.

Digital certificates contain public key information.

C.

When the peer certificate received is within the validity period, but the device's own time is incorrect and the certificate is not within the validity period, the authentication fails.

D.

two pEven if the RI entity is not in the same CA system, as long as the two parties can identify the other party's CA, the identity verification can be completed.

Buy Now
Questions 22

About filter-Policy is the following description correct? (single choice )

Options:

A.

Use filter-Policy, in OSPOn ASBR in F, type5 can be LSA and type7 LSAgeneration is filtered.

B.

Prefix lists can be used to filter routes as well as to filter packets.

C.

filter-policy can filter received or advertised link state information, and can modify the attributes of routing entries.

D.

When using the prefix list to filter routes, the entry ip ip-prefix 1 deny 0.0.0.0 0 less-equal 32 indicates that only the default route is matched.

Buy Now
Questions 23

SSH uses asymmetric encryption algorithms AES and DES to realize the security of data transmission, and uses HMAC to ensure the security of data transmission.

Integrity check for data integrity

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

In order to enable the VPN instance to advertise IP routes to the BGP-EVPN address family, what command needs to be enabled in the BGP view

Options:

A.

advertise vpnv4

B.

to advertise irb

C.

advertise 12vpn vpn

D.

advertise irbv6

Buy Now
Questions 25

The two routers are connected together through serial ports, but they cannot ping each other. Now check the port status as follows:

Can you determine the cause from the above information?

Options:

A.

Insufficient link bandwidth

B.

Subnet mask mismatch

C.

Inconsistent link layer protocols at both ends

D.

The IP addresses of both ends are not on the same network segment

Buy Now
Questions 26

If there are multiple receivers in a multicast group, the administrator enables IGM on the switch connecting the receiversP Snooping function, when the receiver changes from

When the switch receives the general group query message from the querier, how should multiple receivers respond?

Options:

A.

The first receiver whose response time times out is sentReport messages are not sent by other receivers.

B.

Only run ICMPv2, all receivers will respond to the Report message.

C.

Only when IGMPvI is running will all receivers respondReport message.

D.

All recipients will respondReport message

Buy Now
Questions 27

Which of the following statements about BGP route filtering is incorrect?

Options:

A.

Route- The filtering relationship between the nodes of the Policy is"Or", that is, as long as it passes the filtering of a node, it can pass the Route- Policy.

B.

For locally advertised routes, configure routing policies, which take effect before adding routes to the BGP routing table.

C.

In the same node of Route-Policy, multiple if-match clauses for different attributes are "or" relationship.

D.

on receivingBGPWhen routing peers, implement routing policies to filter unnecessary BGP routes, and these routes will not be added to the local BGP routing table.

Buy Now
Questions 28

Which of the following information about BGP4+ is correct?

Options:

A.

BGP4 can use the dampening command to suppress flapping of IBGP routes.

B.

Modify BThe RouterID of the CP will cause the BGP connection between routers to be re-established.

C.

BNext in CP4+ The Hop attribute is represented by an IPv6 address, which can be the link-local address of the next hop.

D.

BGP4+ does not support automatic route aggregation.

Buy Now
Questions 29

After dividing an interface of the firewall into the Untrust security zone, the interface belongs to the untrust zone and no longer belongs to the Local zone.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

Which of the following are used in Ethernet? (Multiple Choice)

Options:

A.

MAC address in non-canonical format

B.

in multiple accessCSMA/CD

C.

Canonical format of the MAC address

D.

802.5 encapsulated frame

E.

802.3 encapsulated frames

Buy Now
Questions 31

Options:

A.

R2 is in the area 0 generated inType3 LSAcontains 10.0.2.2/32routing information

B.

R2 is in the area 0 generated inType2 LSAcontains 10.O.2.2/24routing information

C.

R2 is in the area 0 generated inType1 LSAcontains 10.0.2.2/32routing information

D.

R2 is in the area 0 generated inType5 LSAcontains 10.0.2.2/32routing information

Buy Now
Questions 32

When deploying BGP/MPLS IP VPN, the OSPF VPN Route Tag (VPN Route Tag) is not transmitted in the extended community attribute of MP-BGP, it is only a local concept, and only the PE that receives the MP-BGP route and generates OSPF LSA Makes sense on the router.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

The MAC address table of the switch with default configuration is empty at this time, and the host A connected to the switch sends the first unicast data frame, then what operation will the switch perform after receiving the instruction?

Options:

A.

The switch will drop the frame

B.

The switch will record the source MAC address of the data frame and flood the data frame

C.

The switch will forward the data out an interface according to the destination MAC address of the data frame

D.

The switch will buffer the data frame and forward it after waiting for the destination host to send the data frame

Buy Now
Questions 34

Both OSPFv3 and ISIS are running on the router, and OSPFv3 routes need to be imported into ISIS. Which of the following import configurations is correct: (Multiple Choice)

Options:

A.

Huawei] isis 1

[Huawei-isis-1] is-level level-1

[Huavvei-isis-1] network-entity 47.000.0000.0000.0002.00 [Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1 [Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

B.

Huawei] isis 1

[Huawei-isis-1] is-level level-1

[Huavvei-isis-1] network-entity 47.000.0000.0000.0002.00 [Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1 [Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

C.

[Huawei] isis 1

[Huavvei-isis-1] network-entity 47.0001.000.0000.0002.00 [Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1 [Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

D.

[Huawei] isis 1

[Huavvi-isis-1] network-entity 47.0001.0000 000002.00 [Huawei-isis-1] import-route ospfv3 1

[Huawei-isis-1] quit [Huawei] ospfv3 1

E.

[Huawei-ospfv3-1] routerid 2.2.2.2

F.

[Huawei] isis 1

[Huawei-isis-1] is-level level-1

[Huavvei-isis-1] network-entity 47.0001 0000000.0002.00

[Huawei-isis-1] import-route ospfv3 1 level-1 [Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

Buy Now
Questions 35

How many interfaces of the router have IS-IS enabled, the output is as follows:

Options:

A.

2

B.

3

C.

0

D.

1

Buy Now
Questions 36

The following descriptions about routing policies and policy routing are correct:

Options:

A.

Policy routing mainly controls the forwarding of packets, that is, it can forward packets without following the routing table. B. Policy routing mainly controls the import, publication, and reception of routing information.

B.

The routing policy mainly controls the import, publication and reception of routing information

C.

The routing policy is mainly to control the forwarding of packets, that is, it is not necessary to forward packets according to the routing table

Buy Now
Questions 37

There is an As-path-filter: ip as-path-filter 1 permit .*(100|400)$, the As-path-filter Can not. Which of the following AS_PATH attributes match?

Options:

A.

1234 1400

B.

3100

C.

300 4200

D.

100

Buy Now
Questions 38

Check the LSP on a router and see the following results:

Options:

A.

When sending a data packet whose destination address is 4.4.4.4, it is sent directly without tagging.

B.

The sending destination address is 2.2.2 2 data packets are sent directly without tagging.

C.

When sending a packet whose destination address is 3.3.3.3, tag 1026 and send it.

D.

When the router receives a packet with a label of 1024, it will replace the label with 1027 and send it.

Buy Now
Questions 39

in cross-domain VPN_Option During packet forwarding in mode B, two ASBsR needs to exchange the public and LSP labels once.

Options:

A.

True

B.

false

Buy Now
Questions 40

Two routers, connected together through serial ports, However, the interconnection cannot be pinged. Now check the port status as follows

Can you identify the cause from the above information? (Single Choice)

Options:

A.

Insufficient link bandwidth

B.

IP addresses at both ends are not on the same network segment

C.

Inconsistent link layer protocols at both ends

D.

Subnet mask mismatch

Buy Now
Questions 41

Regarding the description of the security level of the firewall security zone, what is wrong?

Options:

A.

For a newly created security zone, the system defaults to its security level of 1

B.

In the same system, two security zones are not allowed to configure the same security level

C.

Only the security level can be set for a custom security zone

D.

Once the security level is set, it is not allowed to change

Buy Now
Questions 42

The host HW1 in the HW device network wants to join a video conference, what will the host do?

Options:

A.

Unicast IGMPv2 membership report to the default router on the local network

B.

TowardsRP sends unicast IGMPv2 membership report

C.

Send the IGMPv2 membership report through multicast in the local network, and the multicast address carried in the IGMPv2 membership report is the desiredincoming multicast address

D.

The IGMPv2 membership report is sent through multicast on the local network, and the destination multicast address for sending the IGMPv2 membership report is"All PIM routers" 2240.0.2 multicast address

Buy Now
Questions 43

\Which of the following categories can ACL be divided into?

Options:

A.

Basic ACL

B.

Advanced ACL

C.

Layer 2 ACL

D.

User-defined ACL

Buy Now
Questions 44

When the stateless address configuration method is used to configure the IPv4 of the host6 address, and viaDHCPv6 get in addition toHow to set the M and 0 bits in the RA message when there are other parameters other than the address?

Options:

A.

M=1, 0=1

B.

M=0, 0=1

C.

M=1, 0=0

D.

M=0, 0=0

Buy Now
Questions 45

The topology diagram and configuration are as follows. Now I hope that there is no detailed routing entry for 10.0.3.3/32 in the R1 routing table. The following statement can achieve this requirementhave

Options:

A.

existRoute summary is configured on R3, and the route is summarized as 10.0.0.0/16

B.

existRoute summary is configured on R2, and the route is summarized as 10.0.0.0/16

C.

existConfigure filter-policy on R1, match 10.0.3.3/32 through ACL, and apply it in the import direction at the same time

D.

existThe filter-policy is configured on R2, which matches 10.0.3.3/32 through ACL and applies it in the export direction at the same time

Buy Now
Questions 46

The HTTP protocol is based on TCP, so TCP can be used Flood attack defense method defends HTTP Flood attack.

Options:

A.

True

B.

false

Buy Now
Questions 47

BGP routing policy can control the publishing and receiving of routes

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 48

In the process of viewing the debug output through the SSH terminal, a lot of information pops up. Which of the following operations can make the monitor terminal no longer pop up the debug message?

Options:

A.

Open Notepad, enter undo debugging all, copy the command line, paste it into the Monitor interface

B.

Exit the current Monitor interface, re-SSH into the device to open a new Monitor interface

C.

Open Notepad, enter undo terminal debugging, copy the command line, and paste it into the Monitor interface

D.

Open Notepad, enter undo terminal monitor, copy the line command, and paste it into the Monitor interface

Buy Now
Questions 49

When running 0SPFv3 on a Huawei router, the OSPFv3 process will automatically select an interface address as the

for the processRouter ID.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 50

As shown in the figure, the MP-BGP neighbor relationship is established between PE1 and PE2 through the Loopback0 interface. After the configuration is completed, it is found that CE1 and CE2 cannot learn routes from each other. Which of the following options will cause this problem?

Options:

A.

The VPN instance parameters on PE1 or PE2 are incorrectly configured

B.

PE1 or PE2 is not enabled in BGP-VPNv4 unicast address family view neighbor

C.

the LSP tunnel between PE1 and PE2 is not established

D.

The routing protocol between PE1 or PE2 and the respective CE is incorrectly configured

Buy Now
Questions 51

As shown in the figure, an enterprise hopes to realize the secure mutual access between the head office and each branch through MPLS/VPN, and requires that the VPN traffic of the branches must be forwarded through the head office to monitor the traffic. Which of the options described in this solution is wrong?

Options:

A.

BGP packets can be used to exchange VPN routing information between CEs and PEs

B.

Hub-CE and When the Hub-PE transmits routing information, the Hub-PE It is necessary to configure a route that allows the receiving AS number to be repeated once to receiveRoutes advertised by the Hub-CE

C.

Hub-CE and Hub-PE, Spoke-PE with Spoke-CEs can use OSPF to exchange routing information

D.

Spoke- Establish an MP-IBGP peer relationship between PEs to exchange VPN routing information.

Buy Now
Questions 52

There is a new HW office that needs to use their router as a DHCP server. When configuring the DHCP server to provide DHCP service for the HW office, which of the following items need to be configured?

Options:

A.

inDHCP Exclude unused I from the server P Address

B.

configure ping Packet timeout

C.

Configure manual binding

D.

Configure the DHCP address pool

E.

Configure the startup file of the DHCP server

Buy Now
Questions 53

Options:

A.

MPLS system has many kinds of label publishing protocols, such as LDP is a kind of label publishing protocol

B.

MPLS supports single-layer labels and multi-layer labels

C.

the label is a fixed-length identifier with only local significance, used to uniquely identify the FEC to which a packet belongs

D.

the label is carried by the header of the MPLS packet, and has global significance, that is, the label value of all routers cannot be repeated

Buy Now
Questions 54

Which of the following statements about the tail of ISIS protocol LSP packets is correct?

Options:

A.

LSP fast diffusion feature, first diffuse LSPs less than the specified number to speed up the synchronization process of LSDB

B.

by configurationAn intelligent timer generated by LSP, which can automatically adjust the delay time according to the changing frequency of routing information

C.

When the link state information increases, the packet length of the LSP can be increased, so that each LSP can carry more information.

D.

Decreasing the minimum time interval for sending LSPs by port can speed up the diffusion of LSPs.

Buy Now
Questions 55

the following aboutThe establishment process of LDP LSP, which description is correct?

Options:

A.

By default, LSFor the same FEC, the received label mapping can only come from the optimal next hop, not from the non-optimal next hop.

B.

When the network topology change causes the next hop neighbor to change, using the free label retention mode, the LSR can directly use the label sent by the original non-optimal next hop neighbor to quickly rebuild the LSP. Liberal requires more memory and tab space.

C.

Label releaseIn the DoD mode, for a specific FEC, the LSR performs label allocation and distribution without obtaining a label request message from the upstream.

D.

The LSP establishment process is actually the process of binding the FEC to the label and advertising the binding to the upstream LSR of the LSP.

Buy Now
Questions 56

If the advertised route entry is deleted on the BGP router, the BGP router will be triggered to send an Update message for route revocation. Well-known mandatory attribute with revoked routing entries.

Options:

A.

True

B.

false

Buy Now
Questions 57

ISIS Elections in Broadcast Multiple Access NetworkDIS, which of the following statements about DIS is correct?

Options:

A.

ISIS elects by comparing prioritiesDIS, if the priority is the same, compare the MAC address

B.

In a broadcast multiple access network,DIS sends Hello three times as often PDU

C.

DIS ensures database synchronization by periodically sending CSNP messages

D.

The DIS supports the preemption function. After the new DIS is successfully preempted, it does not need to flood any LSP packets.

Buy Now
Questions 58

Which SNMP message type to NMS is reliable for reporting events?

Options:

A.

Inform

B.

Get

C.

Response

D.

Trap

E.

Get Bulk

Buy Now
Questions 59

If the interface sticky MAC function is enabled, what is the number of MAC addresses learned by the interface by default?

Options:

A.

1

B.

15

C.

10

D.

5

Buy Now
Questions 60

OSPRouter in F Lin included in LSAk What are the types of Type? (Multiple Choice)

Options:

A.

StubNet

B.

P-2-P

C.

Vlink

D.

TransNet

Buy Now
Questions 61

As shown below,R1 and R2 have established a Level 2 neighbor relationship. The key configuration is as follows. The following statement about the routing entry of R2 is correct

Options:

A.

2020: The /64 router will appear in the IP routing table

B.

The 2022:/64 router will appear in the IP routing table

C.

2019: The /64 router will appear in the IP routing table

D.

The 2021:/64 router will appear in the IP routing table

Buy Now
Questions 62

As shown in the figure, there are two IPv6 networks that can access the IPv4 network. At the same time, an IPSec tunnel needs to be established between the two IPv6 networks for communication.Which of the following packaging modes can meet the above requirements?

Options:

A.

ESP+tunnel mode

B.

AH+ transmission mode

C.

AH+tunnel mode

D.

None of the above options are correct

Buy Now
Questions 63

As shown in the figure, OSPF is enabled on all interfaces of the router, and. The cost value is indicated in the figure, and the Loopback0 interface of R2 is advertised in the area 1, thenR1 arrives 10. 0.2.2/32Cost value?

Options:

A.

50

B.

150

C.

200

D.

300

Buy Now
Questions 64

Which of the following LSAs are only spread within a single area? (multiple choice)

Options:

A.

AS External LSA

B.

Router LSA

C.

Network LSA

D.

Summary LSA

Buy Now
Questions 65

As shown below, R1 and R2 establish EBGP neighbors and enable the BFD detection function. Which of the following statements is correct (single choice)

Options:

A.

The detection time of BFD packets of R2 is 800ms

B.

The detection time of BFD packets of R1 is 1280ms

C.

The detection time of BFD packets of R1 is 660ms

D.

The detection time of BFD packets of R2 is 600ms

Buy Now
Questions 66

What is the role of RT in MPLS VPN?

Options:

A.

allow peerPE decides which VPNv4 routes to import into a specific VRF

B.

allow peerPE decides which VPNv4 routes to not import into a specific VRF

C.

allow peerCE decides which VPNv4 routes to import into a specific VRF

D.

allow peerCE decides which VPNv4 routes to not import into a specific VRF

Buy Now
Questions 67

The intranet users of a company use the no-pat mode of NAT to access the Internet. If all the public network IP addresses are used, what will happen to the intranet users who access the Internet subsequently?

Options:

A.

Subsequent intranet users will not be able to access the Internet

B.

Automatically switch from NAT to PAT to access the Internet

C.

Synchronize the message to other MT conversion devices for NAT conversion D. Squeeze out the previous user and force NAT conversion to access the Internet

Buy Now
Questions 68

BGP4+ carries the next-hop address of the IPv6 route through the next-Hop attribute in the Update packet.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 69

What is the most efficient way to pass view device alarms via CLI?

Options:

A.

display alarm

B.

display current- configuration

C.

display interface brief

D.

display clock

Buy Now
Questions 70

Which of the following statements about the format of OSPFv3 packets is correct?? (multiple choice)

Options:

A.

OSPF version number changed from 2 to 3

B.

There is no change in the option field of the He11o packet

C.

Hello packets no longer contain address information and carry Interface ID

D.

Removed Authentication, Auth Type field

Buy Now
Questions 71

Which of the following IEEE standards are formulated for Gigabit Ethernet?

Options:

A.

802.3z

B.

802.3ab

C.

802.3ad

D.

802.3af

Buy Now
Exam Code: H12-261_V3.0
Exam Name: HCIE-Routing & Switching (Written) V3.0
Last Update: Apr 14, 2023
Questions: 479