Huawei Related Exams
H12-831_V1.0 Exam
The figure shows the logical network architecture of a migration project. The purpose of the migration is to enable terminals in different geographical locations to communicate with each other and deploy the gateway of the terminals on the PE routers.
After the migration is complete, which of the following methods can be used by network engineers to preliminarily check the network connectivity?

Options:
To protect a device against the attacks of forged BGP messages, you can configure GTSM to check whether the TTL value in the IP message header is within the specified range. If the peer x.x.x.x valid-ttl-hops 100 command is configured on a device, the valid TTL value range of the detected message is [155, 255].
On the OSPF network shown in the figure, the cost values of links are marked. IS-IS Auto FRR is enabled on R1. The primary path from R1 to 10.0.3.3/32 is R1 → R2 → R3, and the backup path is R1 → R4 → R2 → R3.
Is this statement TRUE or FALSE?
