移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 Click the Exhibit button. In the exhibit, what is the purpose of this OSPF configuration?()

A

The router sends the file debugOSPF (containing hellos sent and LSA updates) to the syslog server.

B

The router traces both OSPF hellos sent and LSA updates, and stores the results in the debugOSPFfile.

C

The router traces both OSPF hellos sent and LSA updates, and sends the results to the syslog process with the debugOSPF facility.

D

The router traces all OSPF operations, stores the results in the debugOSPF file, and marks both hellos sent and LSAupdates in the file with a special flag.

单选题 Which statement is true about interface-based static NAT? ()

A

It also supports PAT.

B

It requires you to configure address entries in the junos-nat zone.

C

It requires you to configure address entries in the junos-global zone.

D

The IP addresses being translated must be in the same subnet as the incoming interface.

单选题 A route-based VPN is required for which scenario? ()

A

when the remote VPN peer is behind a NAT device

B

when multiple networks need to be reached across the tunnel

C

when the remote VPN peer is a dialup or remote access client

D

when a dynamic routing protocol such as OSPF is required across the VPN

多选题 Which three security concerns can be addressed by a tunnel mode IPSec VPN secured by AH?()(Choose three.)

A

data integrity

B

data confidentiality

C

data authentication

D

outer IP header confidentiality

E

outer IP header authentication

单选题 Click the Exhibit button. In the exhibit, which statement is correct? ()

A

Three physical interfaces are redundant.

B

You must define an additional Redundancy Group.

C

node 0 will immediately become primary in the cluster.

D

You must issue an operational command and reboot the system for the above configuration to take effect.

多选题 Which two statements regarding asymmetric key encryption are true?() (Choose two.)

A

The same key is used for encryption and decryption.

B

It is commonly used to create digital certificate signatures.

C

It uses two keys: one for encryption and a different key for decryption.

D

An attacker can decrypt data if the attacker captures the key used for encryption.

单选题 You want to create a policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in theUntrust zone. How do you do create this policy? ()

A

Specify the IP address (172.19.1.1/32) as the destination address in the policy.

B

Specify the DNS entry (hostb.example.com.) as the destination address in the policy.

C

Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.

D

Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.

单选题 You are not able to telnet to the interface IP of your JUNOS software with enhanced services devicefrom a PC on the same subnet. What is causing the problem? ()

A

Telnet is not being permitted by self policy.

B

Telnet is not being permitted by security policy.

C

Telnet is not allowed because it is not considered secure.

D

Telnet is not enabled as a host-inbound service on the zone.

单选题 In a JSRP cluster with two J6350 routers, the interface ge-7/0/0 belongs to which device? ()

A

This interface is a system-created interface.

B

This interface belongs to NODE0 of the cluster.

C

This interface belongs to NODE1 of the cluster.

D

This interface will not exist because J6350 routers have only six slots.

1 2 3 下一页 尾页 /

到第