移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

多选题 Which two are characteristics of link-state routing protocols?() (Choose two.)

A

Routers choose a best path for a destination based on the SPF algorithm.

B

All routers in a given area or level build a consistent database describing the network's topology.

C

Routers choose the best path for a destination based on the interface on which they received the link stateadvertisement with the lowest cost.

D

All routers in a given area or level forward link state advertisements between interfaces in the same area or level, adding their metric to the link state advertisement's cost information when they forward it.

单选题 Click the Exhibit button. Which type of source NAT is configured in the exhibit?()

A

static source pool

B

interface source pool

C

source pool with PAT

D

souce pool without PAT

单选题 Based on the configuration shown in the exhibit, what will happen to the traffic matching the security policy?()

A

The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.

B

The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.

C

The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.

D

The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.

多选题 Which three parameters are configured in the IKE policy?() (Choose three.)

A

mode

B

preshared key

C

external interface

D

security proposals

E

dead peer detection settings

单选题 A traditional router is better suited than a firewall device for which function? ()

A

VPN establishment

B

packet-based forwarding

C

stateful packet processing

D

network address translation

单选题 Which parameters must you select when configuring operating system probes SCREEN options?()

A

syn-fin, syn-flood, and tcp-no-frag

B

syn-fin, port-scan, and tcp-no-flag

C

syn-fin, fin-no-ack, and tcp-no-frag

D

syn-fin, syn-ack-ack-proxy, and tcp-no-frag

多选题 In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)

A

IP protocol

B

IP time-to-live

C

source and destination IP address

D

source and destination MAC address

E

source and destination TCP/UDP port

首页 上一页 1 2 3 下一页 尾页 /

到第