更多"Which two statements about static N"的相关试题:
[多项选择]Which two statements about static NAT translations are true?()
A. They are always present in the NAT table.
B. They allow connection to be initiated from the outside.
C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.
D. They require no inside or outside interface markings because addresses are statically defined.
[多项选择]Which two statements about static NAT are true? ()(Choose two.)
A. Static NAT can only be used with destination NAT.
B. Static NAT rules take precedence over overlapping dynamic NAT rules.
C. NAT rules take precedence over overlapping static NAT rules.
D. A reverse mapping is automatically created.
[多项选择]Which two statements are true about static routes in the Junos OS?()
A. Static routes are defined at the [edit routing-instances] hierarchy.
B. Static routes must have a next hop defined.
C. Static routes remain in the routing table until you remove them or until they become inactive.
D. Static routes are learned by neighboring devices and added to their routing tables.
[单项选择]Which statement is true about a NAT rule action of off?()
A. The NAT action of off is only supported for destination NAT rule-sets.
B. The NAT action of off is only supported for source NAT rule-sets.
C. The NAT action of off is useful for detailed control of NAT.
D. The NAT action of off is useful for disabling NAT when a pool is exhausted
[多项选择]Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)
A. Addresses used for NAT pools should never overlap.
B. If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.
C. If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.
D. Dynamic source NAT rules take precedence over static source NAT rules.
[多项选择]Which two static routes are typically configured on your router when a Routed 1483 network is grouping ATM PVCs into alarge subnet?()
A. host route
B. default route
C. customer network
D. ISP’s routing domain
[多项选择]Which two statements about login classes correctly define their usage within the JUNOS software?()
A. A different login class must be configured for each user.
B. Individual commands can be explicitly allowed or denied.
C. A user must be assigned to one of the default login classes.
D. Each login class is associated with one or more permissions flags.
[多项选择]Which two statements about route redistribution when implementing OSPF are true?()
A. Routes learned using any IP routing protocol can only be redistributed into non IP routing protocols.
B. OSPF can import routes learned using EIGRP, RIP, and IS - IS.
C. OSPF routes cannot be exported into EIGRP, RIP, an d IS - IS.
D. At the interdomain level, OSPF cannot import routes learned using BGP.
E. OSPF routes can be exported into BGP.
[多项选择]Which two statements about creating constraints are true?()
A. Constraint names must start with SYS_C
B. All constraints must be defines at the column level.
C. Constraints can be created after the table is created.
D. Constraints can be created at the same time the table is created.
E. Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.
[多项选择]Which two statements about the track configuration option are correct?()
A. The track option monitors interfaces as defined by the user.
B. The track option monitors all interfaces participating in VRRP.
C. The track option allows for a reduction of the priority value if the monitored interface goes down.
D. The track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.
[多项选择]Which two statements about Network Attached Storage are correct?()
A. Data is accessed using NFS or CIFS.
B. Data is accessed at the block level.
C. NAS is referred to as captive storage.
D. Storage devices can be shared between users.
E. A NAS implementation is not as fast as a DAS implementation.
[多项选择]Which two statements about Cisco Security Management Suite are correct?()
A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
[多项选择]Which two statements about an interface configured with the asr-group command are correct?()
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
[多项选择]Which two are advantages of static routing when compared to dynamic routing?()
A. Security increases because only the network administrator may change the routing tables.
B. Configuration complexity decreases as network size increases.
C. Routing updates are automatically sent to neighbors.
D. Route summarization iscompued automatically by the router.
E. Routing traffic load is reduced when used in stub network links
F. An efficient algorithm is used to build routing tables,using automatic updates.
G. Routing tables adapt automatically to topology changes.