题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-11-13 02:09:18

[单项选择]Which statement is correct about logical units on Juniper Router interfaces?()
A. Logical units are used only when a Layer 2 identifier is present such as a VLAN
B. A logical unit of 0 is required when using a frame-relay DLCI
C. A logical unit is always required
D. Logical units are not required unless ATM or 802.1Q VLAN tagging is configured.

更多"Which statement is correct about lo"的相关试题:

[单项选择]Which statement is correct about the forwarding table?()
A. The forwarding table is stored only on the PFE
B. The forwarding table contains all known routes
C. The forwarding table is stored on both the RE and PFE
D. The forwarding table is stored only on the RE
[单项选择]Which statement is correct about the validate option when upgrading JUNOS software?()
A. It will check the MD5 checksum of the install package.
B. It will check if the device meets the memory requirements for the install package.
C. It will check the compatibility of the configuration with the install  package.
D. It will check if the device meets the storage requirement  for the install package.
[单项选择]Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
A. You do not need to configure a RADIUS client policy.
B. You must know the exact model number of the Infranet Enforcer.
C. You must specify the NACN password of the device in the RADIUS client policy.
D. You do not need to designate a location group to which the Infranet Enforcer will belong.
[单项选择]Which statement is correct about a Routing Policy term?()
A. A term must contain a "from" statement.
B. A term acts like "if" and "then" statements.
C. The most specific term has precedence.
D. Terms can be written in any order to achieve the same behavior.
[单项选择]Which statement is correct about policies in the Junos OS?()
A. Import policies are used to filter routes from the routing table to the forwarding table.
B. Import policies are used to filter routes destined for the routing table.
C. Import policies are used to filter routes being sent to neighboring devices.
D. Import policies are used to filter traffic entering the device.
[单项选择]Which statement is correct about HTTP trickling?()
A. It prevents the HTTP client or server from timing-out during an antivirus update
B. It prevents the HTTP client or server from timing-out during antivirus scanning.
C. It is an attack.
D. It is used to bypass antivirus scanners.
[单项选择]Which statement is true about logical units?()
A. Logical units are similar to VLANs used by other vendors.
B. A logical unit is required for transit interfaces.
C. Frame Relay encapsulation supports one logical unit.
D. Link speed and duplex are configured in the logical unit properties.
[单项选择]Which statement about IDS/IPS design is correct?()
A. An IPS should be deployed if the security policy does not support the denial of traffic.
B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
[单项选择]Which statement is correct regarding exception traffic processing?()
A. Exception traffic is only handled by the PFE
B. Exception traffic is rate-limited across the internal link to protect the RE
C. Exception traffic is not prioritized during times of congestion
D. Exception traffic is forwarded based on forwarding table entries
[单项选择]Which statement is correct regarding the operation of DHCP?()
A. A DHCP client uses a ping to detect address conflicts.
B. A DHCP server uses a gratuitous ARP to detect DHCP clients.
C. A DHCP client uses a gratuitous ARP to detect a DHCP server.
D. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.
E. If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator.
F. If an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted.
[单项选择]Which statement is correct according to the passage
A. The elephant is the largest animal in the world.
B. Male elephants all live independently.
C. Baby elephants are looked after by their female families.
D. An elephant family has mothers, grand-mothers and fathers.
[单项选择]Which statement is correct regarding IPv6 addresses?()
A. An IPv6 address consists of 128 bits separated into eight 16-bit hexadecimal sections.
B. An IPv6 address consists of 64 bits separated into four 16-bit hexadecimal sections.
C. An IPv6 address consists of 128 bits separated into sixteen 8-bit hexadecimal sections.
D. An IPv6 address consists of 64 bits separated into eight 8-bit hexadecimal sections.
[单项选择]Which statement is correct regarding the Junos OS?()
A. The same Junos OS image is used on all Junos devices.
B. The Junos OS provides separation between the control and forwarding planes.
C. Each Junos OS image is based on model-specific source code.
D. The Junos OS creates a secondary instance of the kernel to ensure redundancy.
[单项选择]Which statement contains the correct parameters for a route-based IPsec VPN?()
A. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
B. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
C. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
D. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
[单项选择]Which statement of the following is correct according to this passage
A. The boiling point of a liquid is the original temperature.
B. The higher the pressure on the surface of the liquid, the quicker the boiling point will be reached.
C. The boiling point of a liquid is 100 Celsius.
D. Both B and C.
[单项选择]Which of the following is a correct statement about how the user environment is configured at login?()
A. If present, the settings in the $HOME/.profile file will override the settings in the /etc/profile file.
B. If both $HOME/.profile and $HOME/.env files are present, the settings in the $HOME/.profile file will take precedence.
C. The settings in the /etc/environment file are system-wide and will override user customized settings in the $HOME/.profile.
D. The settings in the /etc/profile file will override settings in the $HOME/.profile file unless the $LOCAL_PROFILE variable is set to 'true'.
[单项选择]Which statement is correct about the use of the virtual interface on a WLC ?()
A.  Used to relay DHCP messages
B.  Used to communicate with LAPs
C.  Used to bring up LWAPP tunnels
D.  Used to extend into the wireless client VLAN

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码