更多"What is correct regarding the confi"的相关试题:
[单项选择]Which configuration is correct for a DHCP Relay Proxy?()
A. set dhcp relay 1.1.1.1 set dhcp relay 2.2.2.2 set dhcp relay
B. set dhcp relay proxy set dhcp relay 1.1.1.1 set dhcp relay 2.2.2.2
C. set dhcp relay 1.1.1.1 proxy set dhcp relay 2.2.2.2
D. set dhcp relay 1.1.1.1 set dhcp relay 2.2.2.2 proxy
[单项选择]Which configuration shows the correct application of a security policy scheduler?()
A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } scheduler-name now; } } }
B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }
C. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn scheduler-name now; } } } }
D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; scheduler-name now; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }myTunnel;
[多项选择]Identify three correct statements regarding Oracle E-Business Suite.() (Choose three.)
A. It can run entirely on the Internet.
B. A minimum of two modules needs to be implemented for an organization.
C. It is engineered to work as an integrated system on a single IT infrastructure.
D. It supports multi-directional flows of business information within an organization.
[多项选择]Identify two correct options regarding subscription processing.() (Choose two.)
A. processes user response
B. processes function activities
C. passes information to Notification Mailer
D. sends event information to a workflow process
E. include the task of executing custom code on the event information
[多项选择]Which two statements are correct regarding default protocol preference values?()
A. OSPF has a single preference value for both internal and external routes.
B. RIP is preferred over OSPF external routes.
C. Direct, local, and static routes have the same preference value.
D. OSPF's preference value is lower than BGP (both IBGP and EBGP).
[单项选择]Which statement is correct regarding exception traffic processing?()
A. Exception traffic is only handled by the PFE
B. Exception traffic is rate-limited across the internal link to protect the RE
C. Exception traffic is not prioritized during times of congestion
D. Exception traffic is forwarded based on forwarding table entries
[单项选择]Which statement is correct regarding the operation of DHCP?()
A. A DHCP client uses a ping to detect address conflicts.
B. A DHCP server uses a gratuitous ARP to detect DHCP clients.
C. A DHCP client uses a gratuitous ARP to detect a DHCP server.
D. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.
E. If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator.
F. If an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted.
[单项选择] Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }
A. ftp-group
B. ftp-users
C. firewall-user
D. nancy and walter
[多项选择]Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)
A. protocol list
B. MIME
C. block list
D. extension
[多项选择]Regarding DHCP (dynamic host configuration protocol), which two of the following choices below are true?()
A. The DHCP Discover message uses FF-FF-FF-FF-FF as the Layer 2 destination address.
B. The DHCP Discover message uses UDP as the transport layer protocol.
C. The DHCP Discover message uses a special Layer 2 multicast address as the destination address.
D. The DHCP Discover message uses TCP as the transport layer protocol.
E. The DHCP Discover message does not use a Layer 2 destination address.
F. The DHCP Discover message does not require a transport layer protocol.
[单项选择]When sending an LCP Configuration Request, what can the ERX Edge Router possibly negotiate?()
A. IP address
B. authentication
C. WINS assignment
D. Domain Name Server
[单项选择]When sending an LCP Configuration Request,what can the ERX Edge Router possibly negotiate?()
A. IP address
B. magic number
C. WINS assignment
D. Domain Name Server
[多项选择]Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)
A. LDP uses Down Stream On Demand.
B. RSVP uses Down Stream On Demand.
C. LDP uses Down Stream Unsolicited.
D. RSVP uses Down Stream Unsolicited.