更多"What is the primary use of a remote"的相关试题:
[单项选择]Which remote access VPN addressing technique supports a static IP address to support a specific application?()
A. Use a staticip addresses based on incoming user policies.
B. Use DHCP to assign addresses based on incoming user policies.
C. Deploy a clientless model to assign a unique address to the user.
D. Deploy RADIUS or LDAP to assign the address to the user.
[单项选择]What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
A. RADIUS or LDAP
B. an internal router running EIGRP
C. Reverse Route Injection and OSPF or RIPv2
D. the VPN appliance to be deployed in line with the firewall
[单项选择]What is the purpose of using VPN hardware acceleration equipment?()
A. To offload encryptions functions from router memory
B. To use WebVPN instead of IPSec
C. To decrease performance and efficiency
D. To offload encryption functions from a router CPU
[多项选择]What recommendations does the SQL Access Advisor provide for optimizing SQL queries?() (Choose all that apply.)
A. selection of SQL plan baselines
B. partitioning of tables and indexes
C. creation of index-organized tables
D. creation of bitmap, function-based, and B-tree indexes
E. optimization of materialized views for maximum query usage and fast refresh
[多项选择]What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()
A. Session length
B. User browser information
C. Session IP address
D. User identity information
[多项选择]What are three examples of a CPE-provisioned VPN? ()
A. L2TP
B. 2547bis
C. L2F
D. PPTP
E. MPLS
[单项选择]Which remote access VPN addressing technique supports a static IP address to support a specific application?()
A. Use a static ip addresses based on incoming user policies.
B. Use DHCP to assign addresses based on incoming user policies.
C. Deploy a clientless model to assign a unique address to the user.
D. Deploy RADIUS or LDAP to assign the address to the user.
[单项选择]What does the ip access-routes configuration command accomplish?()
A. It statically places a host route in the routing table.
B. It statically associates an IP address with a customer.
C. It dynamically creates a host route in the routing table.
D. It dynamically assigns an address to the router's interface
[多项选择]What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()
A. sign-in policy
B. authentication realms
C. role restrictions
D. policy realms
E. routing policy
[单项选择]What is the use of MSDP across multiple PIM domains?()
A. It scopes multicast traffic.
B. It prevents multicast routing loops.
C. It advertises active multicast sources.
D. It advertises RPs to all downstream routers.
[多项选择]What are two use cases enabled by IF-MAP Federation?()
A. Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.
B. Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.
C. Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.
D. Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.
[单项选择]What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。
A. permit all packets matching the first three octets of the source address to all destinations
B. permit all packets matching the last octet of the destination address and accept all source addresses
C. permit all packets from the third subnet of the network address to all destinations
D. permit all packets matching the host bits in the source address to all destinations
E. permit all packets to destinations matching the first three octets in the destination address
[多项选择]What two situations could require the use of multiple routing protocols? ()
A. when all equipment is manufactured by Cisco
B. when there are multiple paths to destination networks
C. because having multiple routing protocols confuses hackers
D. when migrating from an older Interior Gateway Protocol (IGP) to a new IGP
E. when using UNIX host - based routers
F. when smaller broadcast domains are desired
[单项选择]Which command should you use to verify what networks are being routed by a given OSPF process()
A. show ip ospf
B. show ip route
C. show ip protocol
D. show ip ospfdatabase
E. None of the other alternatives apply
[单项选择]What do chimps use to hunt, according to the new finding
A. Spears
B. Stones
C. Fire
[单项选择]What will happen if you use language in an improper way
[单项选择]What does the female mosquito use to test her victim's body and sweat
A. Her sensors.
B. Her antennae.
C. Her legs.
D. Her tip.