题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-12-04 05:37:33

[多项选择]What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
A. Allow unrestricted access to the console or VTY ports
B. Use a firewall to restrict access from the outside to the network devices
C. Always use Telnet to access the device command line because its data is automatically encrypted
D. Use SSH or another encrypted and authenticated transport to access device configurations
E. Prevent the loss of passwords by disabling password encryption

更多"What are two recommended ways of pr"的相关试题:

[多项选择]What are two ways that packet fragmentation is handled differently between IPv6 and IPv4?()
A. End hosts determine the path MTU for IPv6.
B. End hosts determine the path MTU for IPv4.
C. Packet fragmentation occurs at intermediate nodes for IPv4.
D. Packet fragmentation occurs at intermediate nodes for IPv6.
[多项选择]What are two ways to create a rescue configuration on a J-series router?()
A. Use the J-Web System > Rescue menu.
B. Use the J-Web Configuration > Rescue menu.
C. Issue the configure rescue save command.
D. Issue the request system configuration rescue save command.
[多项选择]What are two ways that a valid IBGP peering session can be configured?()
A. via the accept x.x/y command
B. via TCP reachable physical interface addresses
C. via remote loopbacks with the local-address command
D. via UDP with the neighbor x.x.x.x command at the group level
[多项选择]In JUNOS software, what are two ways that the router ID is chosen?()
A. Choose the lowest primary address.
B. If assigned, always choose address of fxp0.
C. Choose numerically lowest IP address of fxp0.
D. Choose the non-127.0.0.1 primary address on lo0.
[多项选择]What are two ways to view the system log files on a WX device? ()(Choose two.)
A. Use the CLI and enter show log.
B. Use the CLI and enter show all.
C. Use the CLI and enter show logging.
D. In WebView, choose Admin > Tools > Display System Log.
[多项选择]What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)
A. Admin > Device
B. Device Setup > Topology
C. Compression > Endpoints
D. Device Setup > Advanced > Topology
[多项选择]What are two characteristics of Telnet (Choose two.)()。
A. Itsendsdataincleartextformat.
B. ItisnolongersupportedonCisconetworkdevices.
C. ItismoresecurethanSSH
D. Itrequiresanenterpriselicenseinordertobeimplemented.
E. ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.
[多项选择]What are two Junos processes?()
A. OSPF SPF daemon (ospfd)
B. SNMP daemon (snmpd)
C. BGP daemon (bgpd)
D. Routing protocols daemon (rdp)
[多项选择]What are two characteristics of the RED algorithm as implemented in JUNOS software?()
A. It profiles based on bandwidth.
B. It profiles based on loss priority.
C. It prevents traffic loss through buffering.
D. It prevents global synchronization with tail drops.
[多项选择]What are two characteristics of the Cisco Validated Design program? ()(Choose two.)
A. facilitates customer deployments that are less reliable
B. facilitates customer deployments that are more predictable
C. separates products and technologies into individual portfolios
D. incorporates products and technologies into a broad portfolio
E. strives to protect access to design documentation
[多项选择]What are two characteristics of the relationship between the Cisco PIN architecture and Cisco Validated Designs? ()(Choose two.)
A. Cisco is focusing on Cisco Validated Designs as a means to driving integrated networks.
B. Cisco is focusing on the PIN architecture as a means to driving integrated networks.
C. The Cisco PIN architecture is a critical mechanism for supporting integrated markets because it can be implemented quickly.
D. The Cisco Validated Designs program provides critical mechanisms for supporting integrated markets because the mechanisms can be implemented quickly.
E. Cisco Validated Designs can be implemented quickly without customer input.
[多项选择]What are two functions associated with JUNOS software class of service?()
A. Manage ingress bandwidth.
B. Mark packets for special handling.
C. Manage congestion by intelligently dropping traffic.
D. Classify Frame Relay QoS packets into an equivalent IP CoS environment.
[多项选择]What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
A. Configure an authentication policy as part of the user role definitions.
B. Configure a Sign-in Policy.
C. Configure authentication agents as part of the user role definitions
D. Configure an authentication policy as part of the authentication realm definition.
[多项选择]What are two valid initial configuration methods supported on Juniper routers?()
A. CLI
B. J-Web
C. JUNOScope
D. PCMCIA flash card
[多项选择]What are two important considerations when using 2- or 4-channel 15216 OADMs?() (Choose two.)
A. All "Add" channels require uniform power levels.
B. The flexibility of wavelengths per OADM is limited.
C. It is easier to balance "Pass-Through" and "Add" channels.
D. There is lower pass-through loss using multi-channel OADMs.
E. You can extract a single channel without dropping other channels.
[多项选择]What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()
A. Delivering information about changes in health benefit enrollment to all personnel
B. Enabling online collaboration among research personnel
C. Enabling an interactive virtual classroom for sales personnel in remote locations
D. Delivering a strategic business update from the CEO to all personnel

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码