You are on page 1of 18

H12-221

Question No : 1

When an operating OSPF router receives an LSA and the LSA does not exist in
its link state database, how does the router handle this LSA?

 A.The router will silently discard this LSA without returning any
messages.
 B.This LSA will be immediately flooded to other OSPF neighbors.
 C.The LSA is installed in its own link state database, and then this
LSA is acknowledged by multicast.
 D.Check the age of the LSA to see if it expires.

Question No : 2

How many types can the Hello packets of ISIS be divided into? (Multiple Choice)

 A.Level-1 LAN IIH


 B.Level-2 LAN IIH
 C.Level-3 LAN IIH
 D.P2P LAN IIH

Question No : 3

Regarding the description of IGMPv1 and IGMPv2, the correct one is: (Mu ltiple
Choice)

 A.IGMPv1 packet type does not include a leave member packets.


 B.IGMPv2 packet type includes member leave packets
 C.IGMPv1 supports universal group queries.
 D.IGMPv2 supports only general group queries.

Question No : 4

About multicast RPF check, which of the following statements is wrong? (Multiple
Choice)

 A.Multicast RPF check is not rely on unicast routing.


 B.All multicast protocols use RPF check.
 C.The router receives the multicast packet but fails the RPF check a nd
discards the received multicast packet.
 D.There are two RPF check functions. One is to prevent loops in multicast
routes, the other is to prevent forwarding of redundant multicast data packets.

 Question No : 5

As shown in the following figure, if you do not want employees of


department A have mutual visits, employees in department B can
communicate with each other, but different departments cannot
communicate with each other, and all employees can access the
company's servers. To achieve this function through the MUX VLAN, the
following statement is correct:

 A.VLAN 2 is set to interworking VLAN


 B.VLAN 100 is a slave VLAN
 C.VLAN 3 is set to primary VLAN
 D.VLAN 3 is set to interworking VLAN

Question No : 6

Autonomous System (AS) refers to a set of routers defined by users and using a
unified routing policy.

 A.True
 B.False
Question No : 7

Which of the following is incorrect about the OSPF protocol?

 A.When a router receives a Network-Summary-LSA, the router runs the


SPF algorithm.
 B.Network-LSA is used to describe the link status information of the
broadcast network segment and the NBMA network segment.
 C.Virtual connection is a virtual link that belongs to the backbone area
(Area 0).
 D.Type-4 LSA is used to describe how to reach the ASBR and contain
routing and topology information.

Question No : 8

The route injected into the BGP through the redistributed command has the Origin
attribute of Incomplete.

 A.True
 B.False

Question No : 9

Which of the following is the characteristics of the OSPF stub area?

 A.AS-external-LSAs can be published in the Stub area.


 B.The route to the outside of the AS can only be based on a default route
generated manually by the AB
 C.Virtual connections cannot span the Stub area.
 D.Any area can be a stub area

Question No : 10

In the static LACP mode, the correct description of the active link selection is:
(Multiple Choice)

 A.After a member interface is added to the Eth -Trunk in static LACP mode,
the member interface sends the information negotiation active port about the
system priority, system MAC address, interface priority, and interface number
to the peer.
 B.The higher the system LACP priority is, the higher the priority is. At both
endsI of the devices, select the system with the larger LACP priority value as
the active end. If the system LACP priority is the same, select the one with the
higher MAC address as the active end.
 C.The passive end device determines the activity interface based on the
active end interface LACP priority and interface ID (interface number).
 D.The interfaces selected by two-end device are inconsistent and the data
can be forwarded normally.

Question No : 11

Since the AS-PATH attribute cannot be function within the AS, it is specified that the
BGP router will not advertise any updates from the IBGP peer to its IBGP peers.

 A.True
 B.False

Question No : 12

In the RSTP protocol, the uplink port of the non -root switch has the parameter of the
port identifier. The port identifier consists of two parts, they are:

 A.One-byte port priority and one-byte port number


 B.One-byte port priority and two-byte port number
 C.Two-byte port priority and one-byte port number
 D.Two-byte port priority and two-byte port number

Question No : 13

Which statements about OSPF packets are true? (Select 2 answers)

 A.Hello packets can be sent immediately after the interface joined OSPF
area.
 B.After received LS Update packets, the router must send LSAck for
confirming.
 C.LS Update messages synchronize the link state database by sending
detailed LSAs.
 D.LS Update packets are sent only after an adjacency is established.

Question No : 14

In in es do BGP peers refuse to initiate or accept connection requests?

 A.Established
 B.Idle
 C.Active
 D.OpenConfirm

Question No : 15

The following is part of the router RTA configuration, for the configuration
description of this part, the correct is: (Multiple Choice)

A. A. Disable OSPF packet sending on interface gigabitethernet 1/0/0


B. The interface cannot send HELLO messages
C. The direct route of interface gigabitethernet 1/0/0 can still be
advertised
D. Cannot form a neighbor relationship with the directly connected
neighbor on this interface.
 ABCD

Which of the following statements regarding NSSA commands is false?


A. The default-route-advertise command is used to generate a type-7 default route.
B. The no-import-route parameter prevents the import of AS external routes in the form of
Type-7 LSAs into an NSSA.
C. The no-summary parameter prevents the advertisement of Type-3 and Type-4 LSAs in an
area.
D. The set-n-bit parameter indicates that an N-bit will be set in a DD packet.

In the VRP, by default, after the export route policy of a BGP peer is changed, an update
message can be sent to this neighbor again only through an manual operation.
True
Flase

What are the major parts of the SNAP address used by the IS -IS protocol?
(Multiple Choice)

 A.AREA ID
 B.DSCP
 C.SYSTEM ID
 D.SEL
In a network running STP, multiple topology change informations are sent when
the network topology changes. How many kinds of topology change
informations are defined in the RSTP network?

 A.One kind
 B.Two kinds
 C.Three kinds
 D.Four kinds

Question No : 18

About the definition of router roles within or between OSPF areas, which is correct?
(Multiple Choice)

 A.Internal router: refers to the router whose all interfaces belong to the
same area.
 B.ABR: A router that connects one or more areas and connects to the
backbone area. These routers act as routing gateways for inter-domain
communication.
 C.Backbone router: refers to a router that has at least two interfaces that
belong to the backbone area.
 D.ASBR: It can be an internal router, a backbone router, or a regional edge
router.

Question No : 19

Different port roles are defined in the RSTP protocol, the role of the port that cannot
be in the forwarding state is: (Multiple Choice)

 A.Root Port
 B.Designated Port
 C.Backup Port
 D.Alternate Port
Question No : 19

The differences between IGMP versions are: (Multiple Choice)

 A.IGMPv1/v2 cannot elect the querier on its own, but IGMPv3 can.
 B.For members leaving, IGMPv2/v3 can leave actively, but IGMPv1
cannot.
 C.IGMPv1/v2/v3 cannot support the SSM model.
 D.IGMPv1 does not support specific group queries but IGMPv2
support.

Question No : 21

When an operating OSPF router receives an LSA and the LSA does not exist in its
link state database, how does the router handle this LSA?

 A.The router will silently discard this LSA without returning any messages.
 B.This LSA will be immediately flooded to other OSPF neighbors.
 C.The LSA is installed in its own link state database, and then this LSA is
acknowledged by multicast.
 D.Check the age of the LSA to see if it expires.

Which of the following commands can leak routes of Level -2 areas into Level-1
areas?

 A.import isis level-2 into level-1


 B.import-route isis level-2 into level-1
 C.advertise isis level-2 into level-1
 D.export isis level-2 into level-1

In the multicast network environment, how do an IGMPv1 host and an IGMPv2


muter on the same LAN interact with each other? (Multiple Choice)

 A.If any host on a LAN is running IGMPv1, all hosts on the LAN must
also use IGMPv1.
 B.Membership Report messages sent from the IGMPv1 host will be
received by the IGMPv2 muter.
 C.If the IGMPv1 is in a specific group, the IGMPv2 muter must ignore
all Leave messages received from this group.
 D.The version 2 muter must set a countdown timer associated with
the group that takes into account the presence of the version 1 host.

What happens when the topology of a network running RSTP changes?

 A.Packets are flooded on the entire network.


 B.The aging time of MAC address entries is changed.
 C.Some MAC address entries are deleted.
 D.The entire MAC address table is deleted.

VXLAN users can access the Internet through VXLAN interfaces.

 A.TRUE
 B.FALSE

In a route-policy, which of the following BGP attributes can be used in if-match


clauses? (Multiple Choice)

 A.Local-Preference
 B.AS_Path
 C.TAG
 D.Community

The state of the BGP neighbor establishment process exists as follows.


The sequence of state machines experienced by establishing a
successful connection is

1.Active

2.OpenConfirm

3.Idle

4.Establish

5.OpentSent

A. 3-1-5-2-4

B. 3-5-1-2-4

C. 1-3-5-2-4

D. 3-1-2-5-4
Regarding the two working modes of PIM-DM ad PIM-SM, the correct
description is:

A. PIM-SM must require RP


B. PIM-DM works in a “pull” mode of operation
C. PIM-SM works in a push mode operation
D. PIM-SM is suitable for member-intensive multicast network
structures.

If the router receives two BGP routes with the following attributes. Select the
optimal route based on the BGP selection rules.

A. The optimal route is route M, because its MED is larger than route N.
B. The optimal route is route N, because its MED is smaller than route M
C. The optimal route is route M, because its AS-PATH is shorter than route
N
D. The optimal route is route N, because its AS-PATH is longer than route
M

What are the main steps included in the IS-IS protocol routing calculation?
A. Neighbor relationship establishment
B. Route calculation
C. Link information exchange
D. Routing relase

If the router-id is configured in the system view and the BGP view of router,
because of the high priority of the BGP view, the BGP view uses the rou ter-id
in the BGP view
A. True
B. False

Regarding the NSSA command description, the erros is:


A. The default-route-advertise command is used to advertise the default
route to the common OSPF area.
B. The no-import-route parameter is used to prevent the external route of
the AS from being imported into the NSSA area in the form of Type -7
C. The no-summary parameter indicates that the fourth type of LSA is not
advertised to the area
D. The set-n-bit parameter indicates the flag for setting the N-bit in the DD
insulation, which is an optional field in the DD

The difference between the PIM-SM protocol and the PIM-DM protocol is
A. PIM-SM assumes that there are a small number of recipients in the
network, while PIM-DM assumes that there are a large number of
recipients in the network
B. The BSR/RP exists only in the PIM-SM network but not in the PIM-DM
C. PIM-SM can implement on-demand forwarding. There is no redundant
traffic in the network, and PIM-DM periodically floods, and there is no
redundant traffic in the network.
D. PIM-SM has RPT an SPT trees, while PIM-DM only has SPT trees

Which of the following conditions can cause multicast traffic to fail to


reach the user

A. The router does not have dynamic routing


B. The router-related interface is not be enabled the PIM protocol
C. The upstream router discards the received Graft message
D. The receiver router discards the received IGMP Report

Regarding the description of BGP neighbors, the errors are

A. Manually configure BGP neighbors


B. Successfully establish a TCP connection between two neighboring
routers
C. Exchange link state information between BGP neighbors
D. MD5 authentication must be configured between BGP neighbors

The BGP AS-PATH attribute is an optional transition attribute

A. True
B. False

The routing tool route-policy can give pre-defined condition filtering and set BGP
attributes so it is often used to define policies for BGP peers, and is often used during
route generation. By default, all unmatched routes were rejected to go through route-
policy

A. True
B. False

The hold time carried by the BGP neighbor PeerA in the open is 90s. the hold time carried by
the peerB in the open is 30s. the interval between the peerA and the peerB after the
connection is successfully established is:
A. 90S
B. 30S
C. 10s
D. Do not send Keepalive packet

Link aggregation is a way to bundle a set of physical interfaces together as a logical


interface to increase bandwidth.

There are two types of link aggregation control protocols: manual load balancing mode and static
LACP mode.

A. True
B. False
In the ACL rule, if all the rules are found and there are no rules that meet the conditions, called the
miss rules, no processing is performed on the packets

A. True
B. False

Regarding the description of the network command in BGP, the error is:

A. The route injected through the network must exist in the IP routing table
B. The injected route needs to strictly match the mask length in the IP routing table.
C. By default, BGP does not publish any local network routes.
D. Network cannot be used with the corresponding policy

The correct description of the LSA is:

A. The combination of LS type, Link state ID and LS sequence number identifies one LSA
together.
B. The combination of LS sequence number, link state ID and advertising router identifies one
LSA together.
C. The combination of LS type, Link state ID and advertising router indentifies one LSA together.
D. The combination of LS type, LS sequence number and advertising router identifies one LSA
together

Which of the following information is carried in the BGP open message


A. Local Autonomous System (AS) number
B. BGP ID
C. Hold time
D. Routing properties
E. BGP version

Multicast related protocols do not include


A. PIM
B. DVMRP
C. OSPF
D. MSDP
E. MBGP

The BGP attributes that are typically used to control how data flows out of the AS are

A. AS-path
B. Nexthop
C. Local-Preference
D. MED
In a broadcast or NBMA network, not all neighbors establish adjacencies

A. True
B. False

Which of the following statements regarding OSPF packet authentication is false

A. AR2200 supports the following authentication modes based on encryption algorithm: null,
simple, md5, hmac md5
B. AR2200 supports area authentication and interface authentication
C. When both area authentications and interface authentication exist, area authentication
takes precedence over interface authentication
D. Only the ospf packetsthat pass the authentication are received, if the packets fail

Which of the following statements regarding well-known attributes are true? (Multiple
Choice)
A. well-known attributes include well-known mandatory attributes and well-known transitive
attributes.
B. BGP must identify all well-known attributes.//
C. well-known mandatory attributes can be identified by all BGP routers and must be carried
in Update messages. //
D. Well-know discretionary attributes can be identified by all BGP routers but do not
necessary to be carried in Update messages//

32/ when BGP route load balancing is configured, and there are two load balancing routes
whose first eight BGP attributes described in BGP route selection rules and the AS_Path
attribute are the same, how will the two routes prefix be advertised to neighbors? (SC)
A. The two routes will be both advertised to other BGP peers.//
C. One optimal route is selected from the two routes and then advertised to other BGP
peers.
C. The two routes Will not be advertised to other BGP peers.
D. one optimal route is selected frm o the two routes and then advertised to IBGP peers.

33/ Regardless of any changes in the BGP routing table, the BGP speaker only advirtises the
changed route to the neighbor
A. true//
B. false

34/ What is the Origin attribute of the routes injected into BGP using the network command?
(SC))
A. IGP //
B. EGP
C. incomplete
D. Unknown
35/ by default, the SSM groupe address range is 232.0.0.0/8. which of the following
configuration can change the SSM groupe address range?
A. run the ssm-policy acl number commandein the system view.
B. run the ssm-policy advanced acl number command in the system view.
C. run the ssm-policy acl number command in the PIM View//
D. run the ssm-policy advanced acl number command in the PIM view

36/ which type of the PIM-DM protocol packet does a router send to the downstream router
after it recieve a Graft message from the downstream interface?
A. Join
B. assert
C. Graft
D. Graft-ACK//

37/ which of the following statements regarding multicast MAC address are false(MC)
A. the high 24 bits of the multicast MAC address are 0x01005f, the 25th bit is fixed to 1, and
the lower 23 bits of the MAC address map to the lower 23 bits of the multicast IP address.//
B. one multicast MAC address maps to 32 multicast ip address..
C. a multicast MAC address identifies recievers of multicast group on the data link layer..
D. one multicast MAC address maps to only one multicast IP adderss//

38/ which of the following statements regarding multicast are false?(mc)


A. unicast and broadcast technologies cannot implement point-to-multipoint transmission.
only multicast technology can implement this function//
B. multicast technology is applicable to most of point-to-multipoint data transmission
application..
C. multicast technology is based on TCP, so it can ensure reliable transmission of packets//
D. multicast technology can reduce redundant traffic and conserve bandwidh on a network..

39/ which of the following statements regarding multicast protocols is false?


A. IGMP runs between reciever host and multicast routers, and defines the mechanism for
creating and maintaining group membership between them..
B. distance victor multicast routing protocol (DVMRP) is a dense mode protocol. It define a
route hope count limitof 32.//
C. PIM is a typical intra-domain multicast routing protocol and can operate in the dense
mode (DM) os sparse mode (SM)..
D. MSDP can spread multicast routes accross ASs.//

40/ which of the following statements regarding IGMPv1 and IGMPv2 are true(MC)
A. IGMPv1 does not define the IGMP leave messge type//
B. IGMPv2 defines the leave message type//
C. IGMPv1 supports general query//
D. IGMPv2 support only general query
41/ route import can be configured if networks running different routing protocols need to
share routing information. BGP support only route import using the network command
A. true
B. false//

42/ which of the following statements regarding route selection tools is false?
A. an access control list (ACL) matches routing information of addresses in data packets to
filter out route of data packets that do not meet matching condition.
B. an ip prefix matches destination addresses of route or directly applies to a router
object(gateway)
C. an AS-Path filter matches the AS-Path attribute in BGP routes, so it can only filter BGP
route
D. a community-filter matches community attributes in BGP routes, so so it can only filter
BGP route
E. a route-policy can only match routes and data packets, but cannot change route attributes
or forwarding behaviors for data packets//

43/ acl number 2001


rule 0 permit source 1. 1. 1. 1 0
rule 1 deny source 1. 1. 1.0 0
rule 2 permit source 1. 1. 0. 0 0. 0. 255. 255
rule 3 deny
The following is part of configuration on the router. Which of the following statements
regarding the configuratiOn Is true •
A. Data packets with source IP address 1.1.1.1 match ACL rule 0, and the behavior for the
packets is permit//
B. Data packets with wince IP address 1.1.1.2 match ACL rule 1, and the behavior for the
packets is permit
C. Data packets with source IP address 1.1.1.3 match ACL rule 2, and the behavior for the
packets is deny.
D. Data packets with source IP address 1.1.1.4 match An rule 3. and the behavior for the
packets is permit

44/ Which of the following statements regarding routing policy and policy-based routing are
true? ( )
A. Policy-based routing is used to control packet forwarding without following routes in the
routing table.//
B. A routing policy is used to control import, advertisement, and receiving of routing
information.//
C. A routing policy is used to control packet forwarding without following routes in the
routing table.
D. Policy-based routing is used to control import, advertisement, and receiving of routing
information.
45/ ip-prefix p1 permit 10.0.192.0 8 greater-equal 17 less-equal 18
The following is part of configuration on the router. Which of the following statements
regarding the conflation is true
A. In the 10.0.192.0/8 network segment, a route with a mask length of 18 matches the prefix
list, and behavior for the matching route is permit. //
B. In the 10.0.192.0/8 network segment, a route with a mask length of 19 matches the prefix
list, and behavior for the matching route is permit
C. In the 10.0.192.0/8 network segment, a route with a mask length of 20 matches the prefix
list, and behavior for matching route is permit.
In the 10.0.192.0/8 network segment, a route with a mask length of 21 matches the prefix
list and behavior for matching route is permit.

1. (True or False) Each DD packet has a DD sequence number, which is used for DD
packet acknowledgement. DD contains complete link state information. ( )

2. (Single Response) Which of the following statements regarding stub area configuration
notes is true? ( )
A. The backbone area can be configured as a stub area.
B. If an area is configured as a stub area, all the routers within this area must have stub
area attributes configured.
C. An ASBR can belong to a stub area.
D. A virtual link can pass through a stub area.

3. (Single Response) What is the Origin attribute of the routes injected into BGP using the
network command? ( )
A. IGP
B. EGP
C. Incomplete
D. Unknown

4. (Single Response) Which of the following statements regarding Local-Preference is


true? ( )
A. Local-Preference is a well-known mandatory attribute.
B. Local-Preference affects traffic that enters an AS.
C. Local-Preference can be transmitted between ASs.
D. The default Local-Preference value is 100.

5. (True or False) The AS_Path attribute cannot take effect within an AS. Therefore, a
BGP router will not advertise any Update message received from an IBGP peer to other
IBGP peers. ( )

6. (True or False) The first four bits of a multicast IP address are fixed as 1110 and are
mapped to the high 25 bits of a multicast MAC address. Among the last 28 bits of a
multicast IP address, only 23 bits are mapped to a multicast MAC address, and
information about the other 5 bits is lost. As a result, 32 multicast IP addresses are
mapped to the same MAC address. ( )

7. (True or False) IGMPv1 defines a mechanism to select a querier when there are
multiple routers on a shared network. ( )
8. (Multiple Response) What services and functions can ACLs be applied to the router
AR3200? ( )
A. Routing policy
B. Traffic classifier
C. Firewall
D. Policy-based routing

9. (Multiple Response) Which of the following statements regarding routing policy and
policy-based routing are true? ( )
A. Policy-based routing is used to control packet forwarding without following routes in the
routing table.
B. A routing policy is used to control import, advertisement, and receiving of routing
information.
C. A routing policy is used to control packet forwarding without following routes in the
routing table.
D. Policy-based routing is used to control import, advertisement, and receiving of routing
information.

10. (Single Response) Port isolation provides secure and flexible networking solutions for
users. Which of the following statements regarding port isolation is false? ( )
A. Port isolation can be used for configuring Layer 2 isolation.
B. By default, interfaces are isolated at Layer 2 but can communicate at Layer 3.
C. Before the port isolation function takes effect on an interface, the port isolation function
must be enabled.
D. The port-isolate enable command can run in the system view.

11. (Single Response) On a network running RSTP, some devices use STP. When
RSTP-enabled switches detect a topology change, which method is used by the RSTP-
enabled switches to notify STP-enabled switches of the topology change? ( )
A. RSTP BPDUs with the TC are used.
B. STP BPDUs with the TC are used.
C. RSTP BPDUs with the TCA are used.
D. STP BPDUs with the TCA are used.

12. (Multiple Response) RSTP defines different ports compared with STP. Which of the
following ports cannot work in forwarding state? ( )
A. Root port
B. Designated port
C. Backup port
D. Alternate port

13. (Single Response) Which of the following statements regarding MUX VLAN is true?
( )
A. You do not need to configure the principal VLAN and subordinate VLAN in sequence.
B. The MUX VLAN function must be enabled on an interface so that it can take effect.
C. The principal VLAN and the subordinate VLAN of the MUX VLAN can be the same
VLAN.
D. The MUX VLAN can contain only one subordinate group VLAN.

14. (Single Response) Which of the following statements regarding an SPT switchover
after RPT setup is false? ( )
A. An RPT cannot provide multicast forwarding for a long time.
B. Because all multicast traffic passes through an RP router, the RP router may become
the data forwarding bottleneck.
C. An SPT has the shortest path and provides higher forwarding performance than an
RPT.
D. A RPT cannot be used to forward high volumes of traffic.

15. (Single Response) Which of the following statements regarding the summary
automatic command and BGP route summarization is false? ( )
A. This command enables automatic summarization for the locally imported routes.
B. After this command is configured, BGP summarizes routes based on natural network
segments.
C. After this command is configured, BGP sends only the summarized routes to peers.
D. This command is used to implement automatic summarization. Automatic
summarization takes precedence over manual summarization.

16. (Single Response) What is the function of the detail-suppressed keyword in the
aggregate command? ( )
A. It suppresses the delivery of generated summarized routes to the IP routing table.
B. It suppresses the delivery of specific routes to the IP routing table.
C. It only advertises the summarized routes to other BGP peers.
D. It advertises both the summarized routes and specific routes to other BGP peers.

17. (Multiple Response) Which of the following statements regarding the MED value are
true? ( )
A. According to BGP route selection rules, the MED value has a lower priority than
AS_Path, Preferred-Value, Local-Preference, and Origin.
B. The default MED value of BGP routes is 0.
C. By default, BGP can compare the MED values of routes from different ASs.
D. By default, if there is no MED value in routes, the value 0 is used. If the bestroute med-
none-as-maximum command is configured, the maximum MED value 4294967295 is
used.

18. (Multiple Response) Which of the following statements regarding DR/BDR are false?
( )
A. All DR others establish neighbor relationships with DR and BDR only.
B. In a broadcast network, DR and BDR must be elected. A broadcast network without a
DR or BDR cannot operate normally.
C. DR others listen on the multicast address 224.0.0.5.
D. DR others listen on the network address 224.0.0.6.

19. (Single Response) Which of the following statements regarding OSPF external route
types is false? ( )
A. OSPF includes Type 1 and Type 2 external routes.
B. The cost of a Type 1 external route is the addition of the AS external cost and the AS
internal cost (the cost from a router to an ASBR).
C. The cost of a Type 2 external route is the AS external cost.
D. A Type 2 external route is always preferred over a Type 1 external route when other
conditions are the same.

20. (Single Response) Which of the following statements regarding different LSA types is
false? ( )
A. DD packets contain only LSA summary information, including LS Type, LS ID,
Advertising Router, and LS Sequence Number.
B. LS Request packets contain only LS Type, LS ID, and Advertising Router.
C. LS Update packets contain complete LSA information.
D. LS Ack packets contain complete LSA information.

You might also like