During WLAN deployment, a Fit AP fails to go online on the WAC. You log in to the WAC and run the display ap online-fail-record command to locate the fault. The command output shows that the cause is Insufficient license resources . This means that the license resources on the WAC are insufficient and that you need to expand the license capacity.
R1 has four static routes, each of which has a reachable next hop. Given the following static route configuration, what is the next hop of the route to 20.0.0.0/30 in R1’s routing table?
[R1] ip route-static 20.0.0.0 30 10.1.1.2
[R1] ip route-static 20.0.0.0 30 10.1.2.2 preference 7 0
[R1] ip route-static 20.0.0.0 30 10.1.3.2 preference 50
[R1] ip route-static 20.0.0.0 30 10.1.4.2 preference 100
In Layer 3 in-path WLAN networking, the WAC and Fit APs are connected at Layer 3. APs can obtain the WAC’s address through broadcast or DHCP.
With the continuous development of AI, data center application scenarios are gradually divided into general-purpose computing and intelligent computing scenarios. Data centers need to ensure service continuity of general-purpose computing clusters while unleashing the full potential of intelligent computing clusters, so as to guarantee stable and efficient operation in the AI era. Which of the following statements are true about the service requirements of data center networks in the two scenarios? (Select all that apply)
Both SNMP Trap and Inform Request are used by managed devices to send alarms to the NMS. Inform Request requires an acknowledgment from the NMS, whereas Trap does not.
During VLAN planning for a campus network, VLAN IDs for different service types must be allocated consecutively, without redundancy, to prevent omissions in future allocations.
On the campus network shown in the figure below, the core switch Core1 functions as a Layer 3 gateway and as a DHCP server to dynamically assign IP addresses to AP1, PC1, PC2, and PC3. The network below Core1 is a Layer 2 network. WAC1 and R1 are connected to Core1 at Layer 3. AP1 goes online through VLAN 100. The wireless service VLAN is VLAN 101, and the wired service VLANs for PC2 and PC3 are VLAN 102 and VLAN 103, respectively. Additionally, the direct forwarding mode is used for wireless traffic forwarding. If no additional VLANs are allowed on device interfaces, which of the following VLANs must be allowed on GE1/0/1 of ACC1? (Select all that apply)

Which of the following commands can be used to check OSPF routes in the global routing table?
On the switched network shown in the figure, STP is enabled on all devices. SW1 is the root bridge. The port costs are shown in the figure. Other parameters retain the default values. After the network is stable, which of the following paths is used by SW1 to send traffic to SW4?

Network administrators need to manage and maintain devices on the campus network. Which of the following protocols cannot modify device configurations, such as interface IP addresses, device names, and so on?
Which of the following IPv6 addresses is a link-local address ?
In a wireless communication system, information is first converted into digital signals for easy circuit calculation and processing by the transmitter through source coding, and then converted into radio waves through channel coding and modulation. Which of the following parameters of a carrier are modified during the modulation process based on signal changes? (Select all that apply)
The figure shows the simplified topology of an enterprise campus network. On this network, the aging time of dynamic MAC address entries on switches is 300 seconds.
The administrator connects PC1 to GE1/0/1 of SW1 and successfully pings the IP address of PC2 from PC1. Then, the administrator disconnects the Ethernet cable of PC1
from GE1/0/1 of SW1, immediately connects the cable to GE1/0/2 of SW1, and pings the IP address of PC2 from PC1. Which of the following operations does SW1
perform after receiving a data frame from PC1 when PC1 is connected to GE1/0/2 of SW1?
OSPF supports the division of a network into areas, each identified by an area ID that ranges from 0 to 255. Area 0 is designated as the backbone area.
Secure Shell (SSH) is a protocol that uses encryption and authentication mechanisms to implement network services, such as secure access and file transfer, securely over an insecure network. Which of the following protocols use SSH? (Select all that apply)
In the WAC + Fit AP networking, an AP fails to go online. The output of the display ap all command run on the WAC is shown below. According to the command output, which of the following is the possible cause of the AP’s failure to go online?

OSPF has five types of packets. Which type is used to notify an OSPF neighbor of its required LSAs?
On the network shown in the figure, R1 serves as the gateway for PC2 and PC3, and directly connects to S1 through a physical link. GE1/0/1 on S1 is configured as a trunk interface and permits traffic of VLANs 2 and 3. Its PVID retains the default value. Which of the following statements are true if PC2 and PC3 can communicate with each other? (Select all that apply)
