多选题 What are three examples of a CPE-provisioned VPN? ()
L2TP
2547bis
L2F
PPTP
MPLS
单选题 You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
then reject
then discard
then next filter
then silent-drop
单选题 If the policies shown below evaluate as described, which action will occur for the listed policy expression?() Policy A=True Policy B=True Policy C=True Policy D=False Policy Expression: !(A&&B)||C
The policy evaluates to True (a&&n).
The policy evaluates to True because of c.
The policy evaluates to False because of c.
The policy evaluates to False because of !(a&&b).
多选题 Which three attributes are advertised to the remote PE in BGP-based VPNs?()
circuit ID
VPN label
route target
VPN number
route distinguisher
单选题 Which BGPv4 authentication type is supported in JUNOS software?()
MD4
MD5
RSA
simple password
单选题 A router receives an IPv6 packet which is 2000 bytes in length. The MTU of the outgoing interface is 1500 bytes. Which action will the router take?()
Forward the packet.
Fragment the packet.
Drop the packet silently.
Drop the packet and send an ICMPv6 message.
单选题 You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
from source-port
from source-address
from destination-address
from destination-port
单选题 Which method should be used to dynamically elect an RP when your network is using PIM version1?()
auto-RP
static RP
discovery mode
bootstrap protocol
单选题 Into which protocol are LDP hello messages encapsulated?()
ICMP
BFD
UDP
MPLS
多选题 Which two statements are true by default of a multilevel IS-IS network?()
Level 1 only routers see routes contained in their area.
Level 1 routers route towards Level 2 routers due to the attached bit.
Level 2 routers route towards Level 1 routers due to the attached bit.
Level 2 routers can see routes in other Level 2 areas and routes originated in Level 1 areas.