问题:单选题You would like to operate IS-IS on interface atm 6/0.33 with an IP address of 192.168.1.1/24. Which set of commands accomplishes this?()A router isis network 192.168.1.0 0.0.0.255B router isis network 192.168.1.0 255.255.255.0C interface atm 6/0.33 ip address 192.168.1.1 255.255.255.0 router isisD interface atm 6/0.33 ip address 192.168.1.1 255.255.255.0 ip router isis
查看答案
问题:单选题Which command is used to execute a macro called setup.mac ? ()Amacro setupBmacro setup.macCrun macro setupDrun macro setup.mac
问题:多选题Which two statements accurately describe an IBGP peering session?() (Choose two.)APeers are statically defined.BPeers exist within the same AS.CPeers must be directly connected to each other.DPeers advertise routes learned from other IBGP neighbors.
问题:单选题Two Level 1 routers are exchanging Hello packets with different Area IDs.What occurs between these routers?()A An Adjacency is formed.B No IS-IS PDUs are sentC An Adjacency does not form.D An Adjacency forms but traffic is not forwarded.
问题:多选题Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)ATraffic is permitted from the trust zone to the untrust zone.BIntrazone traffic in the trust zone is permitted.CAll traffic through the device is denied.DThe policy is matched only when no other matching policies are found.
问题:单选题Which command is used to display a address pool for a DHCP Local Server?()A show ip local poolB show ip dhcp local poolC show ip dhcp-local poolD show ip pool
问题:单选题You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam
问题:单选题Which configuration command is used to make the ERX Edge Router an NTP server?()Aset ntp-serverBset ntp serverCntp-server enableDntp server enable
问题:单选题The same Web site is visited for the second time using a branch SRX Series Services Gateway configured with SurfControl integrated Web filtering.Which statement is true?()A The SRX device sends the URL to the SurfControl server in the cloud and the SurfControl server provides the SRX. B The SRX device sends the URL to the SurfControl server in the cloud and the SurfControl server asks the SRX device previously visited.C The SRX device looks at its local cache to find the category of the URL.D The SRX device does not perform any Web filtering operation as the Web site has already been visited.
问题:单选题In a Bridged 1483 network, which set of commands represent an operationally correct configuration for an ATM subinterface?()A interface atm 6/0.33 atm pvc 33 0 33 aal5mux encapsulation bridge1483 ip unnumbered loopback0B interface atm 6/0.33 atm pvc 33 0 33 aal5snap encapsulation bridge1483 ip unnumbered loopback0C interface atm 6/0.33 atm pvc 33 0 33 aal5mux encapsulation bridge1483 ip address unnumbered loopback0D interface atm 6/0.33 atm pvc 33 0 33 aal5snap encapsulation bridge1483 ip address 0.0.0.0 255.255.255.255
问题:多选题Which three functions are provided by the Junos OS for security platforms?()(Choose three.)AVPN establishmentBstateful ARP lookupsCDynamic ARP inspectionDNetwork Address TranslationEinspection of packets at higher levels (Layer 4 and above)
问题:单选题When configuring an explicit path, what does the next-address entry identify?()A the tunnel end pointB the tunnel start pointC a specific node to be traversedD the node prior to the tunnel end point
问题:多选题Which three statements are correct regarding the CLI command, 12tp destination profile to-NewYork virtual-router vr1 ip address 1.1.1.1 ? ()(Choose three.)ALNS IP address is defined.BLAC IP address is defined.CVirtual-router vr1 sends and receives L2TP traffic.DVirtual-router vr1 is the authenticating virtual-router.EThis command is performed on the LNS.
问题:多选题An RSVP session is maintained with the periodic exchange of which two message types?() (Choose two.)ApathBresvCsessionDkeepalive
问题:单选题In a Bridged 1483 network, which set of commands is used to configure an ATM sub-interface?()A interface atm 6/0.33 atm pvc 33 0 33 aal5snap ip description Company-XYZ encapsulation bridge1483 ip address unnumbered loopback0B interface atm 6/0.33 atm pvc 33 0 33 aal5snap ip description Company-XYZ encapsulation bridge1483 ip unnumbered loopback0C interface atm 6/0.33 atm pvc 33 0 33 aal5snap encapsulation bridge1483 ip description Company-XYZ ip address unnumbered loopback0D interface atm 6/0.33 atm pvc 33 0 33 aal5snap encapsulation bridge1483 ip description Company-XYZ ip unnumbered loopback0
问题:多选题Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)AMIME patternBfile extensionCIP spoofingDPOP3Eprotocol command
问题:单选题A BGP connection is being established.What happens if the local router and the peer router do NOT have the same hold-time value configured?()A The BGP session does not establish.B The hold time is assumed to be infinite.C The larger of the two hold-time values is used.D The smaller of the two hold-time values is used.
问题:单选题BGP route dampening is configured on a BGP router. Whose routing behavior is affected by this configuration?()A upstream EBGP neighborsB downstream EBGP neighborsC upstream IBGP neighbors learned by IBGP peersD downstream IBGP neighbors learned by IBGP peers
问题:多选题Which three properties or behaviors of an IP interface are defined by a profile? ()(Choose three.)AIP access routesBMTU size of the interfaceCnumber of PPPoE sessionDusing CHAP for authenticationEassigning the interface to a virtual router