更多"What are two recommended ways of pr"的相关试题:
[多项选择]What are two ways that packet fragmentation is handled differently between IPv6 and IPv4?()
A. End hosts determine the path MTU for IPv6.
B. End hosts determine the path MTU for IPv4.
C. Packet fragmentation occurs at intermediate nodes for IPv4.
D. Packet fragmentation occurs at intermediate nodes for IPv6.
[多项选择]What are two ways to create a rescue configuration on a J-series router?()
A. Use the J-Web System > Rescue menu.
B. Use the J-Web Configuration > Rescue menu.
C. Issue the configure rescue save command.
D. Issue the request system configuration rescue save command.
[多项选择]What are two ways that a valid IBGP peering session can be configured?()
A. via the accept x.x/y command
B. via TCP reachable physical interface addresses
C. via remote loopbacks with the local-address command
D. via UDP with the neighbor x.x.x.x command at the group level
[多项选择]In JUNOS software, what are two ways that the router ID is chosen?()
A. Choose the lowest primary address.
B. If assigned, always choose address of fxp0.
C. Choose numerically lowest IP address of fxp0.
D. Choose the non-127.0.0.1 primary address on lo0.
[多项选择]What are two ways to view the system log files on a WX device? ()(Choose two.)
A. Use the CLI and enter show log.
B. Use the CLI and enter show all.
C. Use the CLI and enter show logging.
D. In WebView, choose Admin > Tools > Display System Log.
[多项选择]What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)
A. Admin > Device
B. Device Setup > Topology
C. Compression > Endpoints
D. Device Setup > Advanced > Topology
[多项选择]What are two characteristics of Telnet (Choose two.)()。
A. Itsendsdataincleartextformat.
B. ItisnolongersupportedonCisconetworkdevices.
C. ItismoresecurethanSSH
D. Itrequiresanenterpriselicenseinordertobeimplemented.
E. ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.
[多项选择]What are two Junos processes?()
A. OSPF SPF daemon (ospfd)
B. SNMP daemon (snmpd)
C. BGP daemon (bgpd)
D. Routing protocols daemon (rdp)
[多项选择]What are two characteristics of the RED algorithm as implemented in JUNOS software?()
A. It profiles based on bandwidth.
B. It profiles based on loss priority.
C. It prevents traffic loss through buffering.
D. It prevents global synchronization with tail drops.
[多项选择]What are two characteristics of the Cisco Validated Design program? ()(Choose two.)
A. facilitates customer deployments that are less reliable
B. facilitates customer deployments that are more predictable
C. separates products and technologies into individual portfolios
D. incorporates products and technologies into a broad portfolio
E. strives to protect access to design documentation
[多项选择]What are two characteristics of the relationship between the Cisco PIN architecture and Cisco Validated Designs? ()(Choose two.)
A. Cisco is focusing on Cisco Validated Designs as a means to driving integrated networks.
B. Cisco is focusing on the PIN architecture as a means to driving integrated networks.
C. The Cisco PIN architecture is a critical mechanism for supporting integrated markets because it can be implemented quickly.
D. The Cisco Validated Designs program provides critical mechanisms for supporting integrated markets because the mechanisms can be implemented quickly.
E. Cisco Validated Designs can be implemented quickly without customer input.
[多项选择]What are two functions associated with JUNOS software class of service?()
A. Manage ingress bandwidth.
B. Mark packets for special handling.
C. Manage congestion by intelligently dropping traffic.
D. Classify Frame Relay QoS packets into an equivalent IP CoS environment.
[多项选择]What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
A. Configure an authentication policy as part of the user role definitions.
B. Configure a Sign-in Policy.
C. Configure authentication agents as part of the user role definitions
D. Configure an authentication policy as part of the authentication realm definition.
[多项选择]What are two valid initial configuration methods supported on Juniper routers?()
A. CLI
B. J-Web
C. JUNOScope
D. PCMCIA flash card
[多项选择]What are two important considerations when using 2- or 4-channel 15216 OADMs?() (Choose two.)
A. All "Add" channels require uniform power levels.
B. The flexibility of wavelengths per OADM is limited.
C. It is easier to balance "Pass-Through" and "Add" channels.
D. There is lower pass-through loss using multi-channel OADMs.
E. You can extract a single channel without dropping other channels.
[多项选择]What are two appropriate uses for Internet Protocol TV broadcasting (IP/TV) technology? ()
A. Delivering information about changes in health benefit enrollment to all personnel
B. Enabling online collaboration among research personnel
C. Enabling an interactive virtual classroom for sales personnel in remote locations
D. Delivering a strategic business update from the CEO to all personnel