题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-12-02 04:47:23

[单项选择]Which statement is correct regarding the operation of DHCP?()
A. A DHCP client uses a ping to detect address conflicts.
B. A DHCP server uses a gratuitous ARP to detect DHCP clients.
C. A DHCP client uses a gratuitous ARP to detect a DHCP server.
D. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.
E. If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator.
F. If an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted.

更多"Which statement is correct regardin"的相关试题:

[单项选择]Which statement is correct regarding the operation of DHCP?()
A. A DHCP client uses a ping to detect address conflicts.(ARP)
B. A DHCP server uses a gratuitous ARP to detect DHCP clients.
C. A DHCP client uses a gratuitous ARP to detect a DHCP server.
D. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.
E. If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator.
F. If an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted.
[单项选择]Which statement is generally correct regarding the maintenance requirements for ships under GMDSS().
A. Redundancy of functions of certain equipment will partially meet this requirement
B. On-board maintenance provided by a person holding a GMDSS maintainer's license will partially meet the requirements
C. Shoreside maintenance and scheduled tests and inspections will partially meet this requirement
D. All of the above
[单项选择]Which statement is correct regarding exception traffic processing?()
A. Exception traffic is only handled by the PFE
B. Exception traffic is rate-limited across the internal link to protect the RE
C. Exception traffic is not prioritized during times of congestion
D. Exception traffic is forwarded based on forwarding table entries
[单项选择]Which statement is correct regarding IPv6 addresses?()
A. An IPv6 address consists of 128 bits separated into eight 16-bit hexadecimal sections.
B. An IPv6 address consists of 64 bits separated into four 16-bit hexadecimal sections.
C. An IPv6 address consists of 128 bits separated into sixteen 8-bit hexadecimal sections.
D. An IPv6 address consists of 64 bits separated into eight 8-bit hexadecimal sections.
[单项选择]Which statement is correct regarding the Junos OS?()
A. The same Junos OS image is used on all Junos devices.
B. The Junos OS provides separation between the control and forwarding planes.
C. Each Junos OS image is based on model-specific source code.
D. The Junos OS creates a secondary instance of the kernel to ensure redundancy.
[单项选择]Which statement contains the correct parameters for a route-based IPsec VPN?()
A. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
B. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
C. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
D. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
[单项选择]Which statement is correct about the forwarding table?()
A. The forwarding table is stored only on the PFE
B. The forwarding table contains all known routes
C. The forwarding table is stored on both the RE and PFE
D. The forwarding table is stored only on the RE
[单项选择]Which statement is correct about the validate option when upgrading JUNOS software?()
A. It will check the MD5 checksum of the install package.
B. It will check if the device meets the memory requirements for the install package.
C. It will check the compatibility of the configuration with the install  package.
D. It will check if the device meets the storage requirement  for the install package.
[单项选择]Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
A. You do not need to configure a RADIUS client policy.
B. You must know the exact model number of the Infranet Enforcer.
C. You must specify the NACN password of the device in the RADIUS client policy.
D. You do not need to designate a location group to which the Infranet Enforcer will belong.
[单项选择]Which statement is correct about a Routing Policy term?()
A. A term must contain a "from" statement.
B. A term acts like "if" and "then" statements.
C. The most specific term has precedence.
D. Terms can be written in any order to achieve the same behavior.
[单项选择]Which statement is correct about logical units on Juniper Router interfaces?()
A. Logical units are used only when a Layer 2 identifier is present such as a VLAN
B. A logical unit of 0 is required when using a frame-relay DLCI
C. A logical unit is always required
D. Logical units are not required unless ATM or 802.1Q VLAN tagging is configured.
[单项选择]Which statement is correct about policies in the Junos OS?()
A. Import policies are used to filter routes from the routing table to the forwarding table.
B. Import policies are used to filter routes destined for the routing table.
C. Import policies are used to filter routes being sent to neighboring devices.
D. Import policies are used to filter traffic entering the device.
[单项选择]Which statement is true regarding virtual private catalogs?()
A. A virtual private catalog owner can create a local stored script, and have read/write access to a global stored script.
B. The virtual private catalog owner cannot create and modify the stored scripts.
C. The set of views and synonyms that make up the virtual private catalog is stored in the schema of the RMAN recovery catalog owner.
D. To perform most of the RMAN operations, the virtual catalog owner must have the SYSDBA or SYSOPER privilege on the target database
[单项选择]Which statement is true regarding online redefinition for the migration of BasicFile LOBs to SecureFile LOBs?()
A. It cannot be done in parallel.
B. It can be done at the table level or partition level.
C. It does not require additional storage because the operation is done online.
D. Local and global indexes are maintained automatically during the operation.
[单项选择]Which statement is correct about HTTP trickling?()
A. It prevents the HTTP client or server from timing-out during an antivirus update
B. It prevents the HTTP client or server from timing-out during antivirus scanning.
C. It is an attack.
D. It is used to bypass antivirus scanners.
[单项选择]Which statement about vlan operation on cisco catalyst switches is true?()
A.   when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.
B. unkown unicast frames are retransmitted only to the ports that belong to the same vlan
C. ports between switches should be configured in access mode so that vlans can span across the ports
D. broadcast and multicast frames are retransmitted to ports that are configured on different vlan.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码