更多"What are two merits of having a cor"的相关试题:
[多项选择]What are two characteristics of Telnet (Choose two.)()。
A. Itsendsdataincleartextformat.
B. ItisnolongersupportedonCisconetworkdevices.
C. ItismoresecurethanSSH
D. Itrequiresanenterpriselicenseinordertobeimplemented.
E. ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.
[多项选择]What are two characteristics of the Cisco Validated Design program? ()(Choose two.)
A. facilitates customer deployments that are less reliable
B. facilitates customer deployments that are more predictable
C. separates products and technologies into individual portfolios
D. incorporates products and technologies into a broad portfolio
E. strives to protect access to design documentation
[多项选择]Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)
A. protocol list
B. MIME
C. block list
D. extension
[多项选择]What are two characteristics of the RED algorithm as implemented in JUNOS software?()
A. It profiles based on bandwidth.
B. It profiles based on loss priority.
C. It prevents traffic loss through buffering.
D. It prevents global synchronization with tail drops.
[多项选择]What are two considerations to using IP Multicast delivery?()
A. no congestion avoidance
B. not for bandwidth intensive applications
C. no guaranteed delivery mechanism
D. source sends multiple data streams out each interface
[多项选择]What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
A. Allow unrestricted access to the console or VTY ports
B. Use a firewall to restrict access from the outside to the network devices
C. Always use Telnet to access the device command line because its data is automatically encrypted
D. Use SSH or another encrypted and authenticated transport to access device configurations
E. Prevent the loss of passwords by disabling password encryption
[单项选择]Seeing me having a good time in repose, she was powerless to hide her disgust.
[多项选择]What are two routing requirements for a device to communicate with another device?()
A. end-to-end communications path
B. hosts on the same Layer 2 broadcast domain
C. hosts on the same Layer 3 broadcast domain
D. routing information on participating Layer 3 devices
[多项选择]What are two requirements when using Packet Flow Acceleration? ()(Choose two.)
A. Traffic needs be compressed.
B. Quality of service must be enabled.
C. A service tunnel must exist in at least one direction.
D. PFA must be enabled on the client-side WX device.
[多项选择]What are two components of the discovery guide in the Cisco SBR sales approach?()
A. Calculate Business Need PriorityAnd Evolution Phase
B. Prioritize and Prepare Solutions Recommendations
C. Pain Point and Implementation Assessment
D. Business Needs-based Solution Recommended
[多项选择]What are two components of the Junos software architecture? ()(Choose two.)
A. Linux kernel
B. routing protocol daemon
C. session-based forwarding module
D. separate routing and security planes
[多项选择]What are two features of Packet Flow Acceleration?() (Choose two.)
A. Policy-Based Multipath
B. TCP Acceleration (AFP)
C. Forward Error Correction
D. Molecular Sequence Reduction
[多项选择]What are two roles of the authenticator as described in the 802.1X standard? ()
A. It proxies the authentication information between the supplicant and the authentication server.
B. It controls physical access to the network.
C. It communicates with the authentication server only.
D. It is responsible for verifying the identity of the supplicant through the use of an internal database.
[多项选择]What are two features provided by the Junos Pulse client?()
A. 802.1X
B. video messaging
C. IPsec
D. VoIP
[多项选择]What are two benefits for prospects, derived from the Cisco SBR methodology?()
A. creates a link between business and IT planning
B. increases profitability
C. increases customer loyalty
D. lowers TCO
[多项选择]What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()
A. Kill a running process on the endpoint, based on executable name and MD5 checksum.
B. Delete a file on the endpoint's file system.
C. Download and run a remediation executable from the local software distribution server.
D. Alter registry entries to prevent future execution of an executable, based on executable name and full path.
[多项选择]What are two enhancements that OSPFv3 supports over OSPFv2? ()
A. It requires the use of ARP.
B. It can support multiple IPv6 subnets on a single link.
C. It supports up to 2 instances of OSPFv3 over a common link.
D. It routes over links rather than over networks.
[单项选择]Frank is having a tough time deciding whether to dress _____ or formally for the party tomorrow
A. plainly
B. carefully
C. smartly
D. casually
[单项选择]An administrator is having a hard time adding a new switch to the network. After verifying that allthe ports are configured correctly on each switch, which of the following should the administratorverily NEXT?()
A. Straight-through cable is used to connect both switches
B. Loopback plug is connected
C. Crossover cable is used to connect both switches
D. Cable is a rollover cable