多选题Which three statements are true regarding the Network Time Protocol (NTP) in JUNOS platforms?()AMD5 authentication is supported.BA client always synchronizes to a server even when the difference between the server clock and the local clock differs by a

题目
多选题
Which three statements are true regarding the Network Time Protocol (NTP) in JUNOS platforms?()
A

MD5 authentication is supported.

B

A client always synchronizes to a server even when the difference between the server clock and the local clock differs by a large amount.

C

JUNOS software can provide a primary time reference.

D

The boot-server configuration allows a router to synchronize its clock when it boots up, regardless of the offset between the NTP clock source and its internal clock.

E

It is useful to correlate timestamps on log files and other events for troubleshooting and forensics.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are true regarding the use of NTP clock synchronization?()

A. The Junos OS supports client, server, and symmetric modes of NTP operation.

B. Synchronized time on all network devices makes log messages more useful for troubleshooting.

C. Authentication methods are not supported.

D. The Junos OS must be used as the primary time reference.


参考答案:A, B

第2题:

Which three statements are true regarding the Network Time Protocol (NTP) in JUNOS platforms?()

A.MD5 authentication is supported.

B.A client always synchronizes to a server even when the difference between the server clock and the local clock differs by a large amount.

C.JUNOS software can provide a primary time reference.

D.The boot-server configuration allows a router to synchronize its clock when it boots up, regardless of the offset between the NTP clock source and its internal clock.

E.It is useful to correlate timestamps on log files and other events for troubleshooting and forensics.


参考答案:A, D, E

第3题:

Which statement is true regarding the Network Time Protocol (NTP) on Junos devices?()

A. MD5 authentication is supported by the Junos OS

B. Server mode is not supported by the Junos OS

C. The Junos OS can provide a primary time reference

D. The Junos OS does not support the use of a boot server


参考答案:A

第4题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第5题:

Which operational mode command can be used to synchronize the local system with an NTP server?()

A. set ntp time 64.32.129.3

B. set clock ntp 64.32.129.3

C. set time 64.32.129.3

D. set date ntp 64.32.129.3


参考答案:D

第6题:

Which protocol is used between the RAS and the authentication server in a narrowband network environment?()

A.RADIUS

B.PPPPAP

C.MSCHAP

D.PPPCHAP


参考答案:A

第7题:

Which statemetn is true regarding the Network Time Protocol (NTP) on Junos devices?()

A. MD5 authenticaton is supported by the Junos OS

B. Server mode is not supported by the Junos OS

C. The Junos OS can provide a primarytime reference

D. The Junos OS does not support the use of a boot server


参考答案:A

第8题:

Which operational mode command can be used to synchronize the local system time with an NTP server?()

A. set ntp time 64.32.129.3

B. set clock ntp 64.32.129.3

C. set time 64.32.129.3

D. set date ntp 64.32.129.3


参考答案:D

第9题:

Which protocol is used between the RAS and the authentication server in a narrowband network environment?()

  • A、RADIUS
  • B、PPPPAP
  • C、MSCHAP
  • D、PPPCHAP

正确答案:A

第10题:

What is a characteristic of Network Time Protocol?()

  • A、NTP updates are sent in the timezone they are collected in,and the syslog server will adjust based  on the input time.
  • B、NTP authentication verifies the source,not the recipient.
  • C、NTP authentication requires that the recipient has multiple strata clocks to ensure accuracy.
  • D、Secure NTP can be configured to use SHA-1 hashing,since NTP is very insecure.
  • E、A stratum 0 clock should be configured at the core of every network,so it can connect to an accuratetime source.

正确答案:B

更多相关问题