更多"Which command will apply a policy t"的相关试题:
[单项选择]Which command is required to apply an access list on a virtual terminal line of a router?()
A. Router(config-line)# access-class 10 in
B. Router(config-if)# ip access-class 23 out
C. Router(config-line)# access-group 15 out
D. Router(config-if)# ip access-group 110 in
E. Router(config-line)# access-list 150 in
F. Router(config-if)# ip access-list 128 out
[多项选择]After executing the "show host" command, which of the information below would you see?()
A. The IP addresses of workstations allowed gain access to the router via an access list
B. Permanent name-to-address mappings created using the ip host command.
C. Temporary and permanent DNS entries.
D. The names of the routers created using the hostname command.
E. The length of time of users logged into the router, as well as the duration
[多项选择]Which two statements apply to policy scheduling?() (Choose two.)
A. An individual policy can have only one scheduler applied.
B. You must manually configure system-time updates.
C. Multiple policies can use the same scheduler.
D. Policies that do not have schedulers are not active.
[单项选择]Which CLI command do you use to determine which files are cleanup candidates?()
A. request system storage cleanup candidates
B. request sytem services storage candidates
C. request system services candidate cleanup
D. request system storage cleanup dry-run
[单项选择]The mksysb command completed successfully. Which of the following steps are necessary to verify the mksysb is good?()
A. Store the mksysb in a safe place because a successful completion guarantees the mksysb is good.
B. Boot from the mksysb to verify it is bootable and list the files on the mksysb.
C. Look at the bosboot output when the mksysb was created to verify it is good.
D. List the files on the mksysb beucase listing all the files verifies there are no problems with the mksysb.
[单项选择]Which command is used to debug a ping command?()
A. debug icmp
B. debug ip icmp
C. debug tcp
D. debug packet
[单项选择]Which configuration command permits dynamic detection of the ATM frame format?()
A. aal5mux
B. aal5snap
C. aal5dynamic
D. aal5autoconfig
[单项选择]Which configuration command dynamically detects and configures a PPPoA interface?()
A. auto-configure ip
B. auto-configure ppp
C. auto-configure pppoe
D. auto-configure bridgedethernet
[单项选择]Which profile configuration command dynamically creates a host route in the routing table?()
A. ip host routes
B. ip access-routes
C. host routes enabled
D. access-routes enabled
[多项选择]Which two statements apply to dynamic access lists?()
A. they offer simpler management in large internetworks.
B. you can control logging messages.
C. they allow packets to be filtered based on upper-layer session information.
D. you can set a time-based security policy.
E. they provide a level of security against spoofing.
F. they are used to authenticate individual users.
[单项选择]Which command synchronizes or rebuilds the logical volume control block, the device configuration database, and the volume group descriptor areas on the physical volumes?()
A. syncvg rootvg
B. synclvm rootvg
C. varyonvg rootvg
D. synclvodm rootvg
[单项选择]Which command displays the current temperature of a Junos device's components?()
A. show chassis temperature-thresholds
B. show chassis environment
C. show chassis hardware
D. show chassis alarms
[单项选择]Which command displays the egress interfaces selected on the PFE for destination prefixes?()
A. show route forwarding-table
B. show route table
C. show route table extensive
D. show pfefwdd
[单项选择]Which command displays the CHAP authentication process as it occurs between two routers?()
A. debug authentication
B. debug chap ppp
C. debug chap authentication
D. debug ppp authentication
[单项选择]Which command sets and automatically encrypts the privileged enable mode password?()
A. enbale password c1sco
B. secret enable c1sco
C. password enable c1sco
D. enable secret c1sco