更多"Which of the following archiving me"的相关试题:
[单项选择]History is ______ a subject which only lets us know something in history.
A. rather than
B. less than
C. other than
D. more than
[单项选择]Which user authentication methods are available in JUNOS?()
A. MD5 and SHA
B. RADIUS and TACACS only
C. Local User Database
D. Local user Database, RADIUS, and TACACS+
[多项选择]Which two external authentication methods are supported by the Junos OS for user authentication?()
A. RADIUS
B. KERBEROS
C. IPsec
D. TACACS+
[多项选择]Which two methods advertise internal networks to external ISPs via BGP?()
A. using aggregate routes
B. defining routes via the network statement
C. disablin g synchronization
D. forcing the next - hop address
[多项选择]Which two queuing methods are supported by outbound QoS?() (Choose two.)
A. weighted fair priority
B. weighted fair queuing
C. weighted strict priority
D. weighted strict queuing
[多项选择]Which two wireless encryption methods are based on the RC4 encryption algorithm? ()
A. WEP
B. CCKM
C. AES
D. TKIP
E. CCMP
[单项选择]Which of the following replication methods is MOST fault tolerant?()
A. Hot site
B. Active/passive clustering at the same site
C. Disk-to-disk replication in the same server
D. Warm site
[多项选择]Which of the following are methods to automatically update the antivirus application?() (Select TWO).
A. Establish rules in the email scheduling program to perform updates.
B. Select Update Now from the program options.
C. Use the Automatic Update feature built into the application.
D. Use scripts.
E. Use Windows Update.
[多项选择]Which two secure remote access methods are available on the WX platforms?() (Choose two.)
A. SSL
B. SSH
C. Telnet
D. HTTP
[多项选择]Which of the following three BGP filtering methods enabled with the neighbor command will filter BGP prefixes based on the prefix and prefix length?()
A. A neighbor distribute - list out command, referencing a standard ACL
B. A neighbor prefix - list out command
C. A neighbor filter - list out command
D. A neighbor distribute - list out command, referencing an extended ACL
E. A neighbor route - map out command
[多项选择]Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
[多项选择]Which three methods can you use for route discovery on a WX platform? ()(Choose three.)
A. Enable RIP
B. Enable OSPF
C. Periodically poll any router
D. Import routes from a TFTP server
[单项选择]Which of the following methods is used to provide a standard to measure performance
A. Benchmarkin
B. Samplin
C. Estimatin
D. Levelin
[单项选择]Which of the following methods of rhetoric is NOT used in this passage
A. questions and answers
B. figures
C. examples
D. analogy
[多项选择]Which of the following are valid methods of providing a router with information concerning the location of the RP()
A. Statically defined RP
B. Bootstrap Router
C. Auto-RP
D. RP Discovery Protocol(RDP)
E. RP Helios
F. RPARP(RARP)
[多项选择]In JUNOS software, which two are methods of restricting multicast traffic beyond your domain? ()
A. MSDP
B. Routing policy
C. Administrative scoping
D. Bootstrap export policy
[多项选择]Which of the following methods can be used to apply a file system to a hard drive partition?()
A. Device Manager MMC
B. Format Command
C. Disk Management MMC
D. Windows Explorer Menus
E. FDISK Command
[单项选择]Which of the following methods can move files in clear text and can be easily intercepted?()
A. RSH
B. SNMP
C. FTP
D. TELNET