移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 You are not able to telnet to the interface IP of your JUNOS software with enhanced services devicefrom a PC on the same subnet. What is causing the problem? ()

A

Telnet is not being permitted by self policy.

B

Telnet is not being permitted by security policy.

C

Telnet is not allowed because it is not considered secure.

D

Telnet is not enabled as a host-inbound service on the zone.

多选题 Which two statements regarding asymmetric key encryption are true?() (Choose two.)

A

The same key is used for encryption and decryption.

B

It is commonly used to create digital certificate signatures.

C

It uses two keys: one for encryption and a different key for decryption.

D

An attacker can decrypt data if the attacker captures the key used for encryption.

单选题 In a JSRP cluster with two J6350 routers, the interface ge-7/0/0 belongs to which device? ()

A

This interface is a system-created interface.

B

This interface belongs to NODE0 of the cluster.

C

This interface belongs to NODE1 of the cluster.

D

This interface will not exist because J6350 routers have only six slots.

多选题 Which three parameters are configured in the IKE policy?() (Choose three.)

A

mode

B

preshared key

C

external interface

D

security proposals

E

dead peer detection settings

单选题 Click the Exhibit button. In the exhibit, which statement is correct? ()

A

Three physical interfaces are redundant.

B

You must define an additional Redundancy Group.

C

node 0 will immediately become primary in the cluster.

D

You must issue an operational command and reboot the system for the above configuration to take effect.

单选题 Click the Exhibit button. Which type of source NAT is configured in the exhibit?()

A

static source pool

B

interface source pool

C

source pool with PAT

D

souce pool without PAT

多选题 Which two are characteristics of link-state routing protocols?() (Choose two.)

A

Routers choose a best path for a destination based on the SPF algorithm.

B

All routers in a given area or level build a consistent database describing the network's topology.

C

Routers choose the best path for a destination based on the interface on which they received the link stateadvertisement with the lowest cost.

D

All routers in a given area or level forward link state advertisements between interfaces in the same area or level, adding their metric to the link state advertisement's cost information when they forward it.

单选题 You want to create a policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in theUntrust zone. How do you do create this policy? ()

A

Specify the IP address (172.19.1.1/32) as the destination address in the policy.

B

Specify the DNS entry (hostb.example.com.) as the destination address in the policy.

C

Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.

D

Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.

单选题 Which parameters must you select when configuring operating system probes SCREEN options?()

A

syn-fin, syn-flood, and tcp-no-frag

B

syn-fin, port-scan, and tcp-no-flag

C

syn-fin, fin-no-ack, and tcp-no-frag

D

syn-fin, syn-ack-ack-proxy, and tcp-no-frag

1 2 3 下一页 尾页 /

到第