单选题 Click the Exhibit button. In the exhibit, what is the purpose of this OSPF configuration?()
The router sends the file debugOSPF (containing hellos sent and LSA updates) to the syslog server.
The router traces both OSPF hellos sent and LSA updates, and stores the results in the debugOSPFfile.
The router traces both OSPF hellos sent and LSA updates, and sends the results to the syslog process with the debugOSPF facility.
The router traces all OSPF operations, stores the results in the debugOSPF file, and marks both hellos sent and LSAupdates in the file with a special flag.
单选题 Which statement is true about interface-based static NAT? ()
It also supports PAT.
It requires you to configure address entries in the junos-nat zone.
It requires you to configure address entries in the junos-global zone.
The IP addresses being translated must be in the same subnet as the incoming interface.
单选题 A route-based VPN is required for which scenario? ()
when the remote VPN peer is behind a NAT device
when multiple networks need to be reached across the tunnel
when the remote VPN peer is a dialup or remote access client
when a dynamic routing protocol such as OSPF is required across the VPN
多选题 Which three security concerns can be addressed by a tunnel mode IPSec VPN secured by AH?()(Choose three.)
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
单选题 Click the Exhibit button. In the exhibit, which statement is correct? ()
Three physical interfaces are redundant.
You must define an additional Redundancy Group.
node 0 will immediately become primary in the cluster.
You must issue an operational command and reboot the system for the above configuration to take effect.
多选题 Which two statements regarding asymmetric key encryption are true?() (Choose two.)
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
单选题 Click the Exhibit button. In the exhibit, what is the priority for Router B in VRRP group 100?()
1
100
110
255
单选题 You want to create a policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in theUntrust zone. How do you do create this policy? ()
Specify the IP address (172.19.1.1/32) as the destination address in the policy.
Specify the DNS entry (hostb.example.com.) as the destination address in the policy.
Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.
Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.
单选题 You are not able to telnet to the interface IP of your JUNOS software with enhanced services devicefrom a PC on the same subnet. What is causing the problem? ()
Telnet is not being permitted by self policy.
Telnet is not being permitted by security policy.
Telnet is not allowed because it is not considered secure.
Telnet is not enabled as a host-inbound service on the zone.
单选题 In a JSRP cluster with two J6350 routers, the interface ge-7/0/0 belongs to which device? ()
This interface is a system-created interface.
This interface belongs to NODE0 of the cluster.
This interface belongs to NODE1 of the cluster.
This interface will not exist because J6350 routers have only six slots.