更多"Which statement is correct accordin"的相关试题:
[单项选择]Which statement is correct regarding exception traffic processing?()
A. Exception traffic is only handled by the PFE
B. Exception traffic is rate-limited across the internal link to protect the RE
C. Exception traffic is not prioritized during times of congestion
D. Exception traffic is forwarded based on forwarding table entries
[单项选择]Which statement is correct regarding the operation of DHCP?()
A. A DHCP client uses a ping to detect address conflicts.(ARP)
B. A DHCP server uses a gratuitous ARP to detect DHCP clients.
C. A DHCP client uses a gratuitous ARP to detect a DHCP server.
D. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.
E. If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator.
F. If an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted.
[单项选择]Which statement is correct about the forwarding table?()
A. The forwarding table is stored only on the PFE
B. The forwarding table contains all known routes
C. The forwarding table is stored on both the RE and PFE
D. The forwarding table is stored only on the RE
[单项选择]Which statement is correct about the validate option when upgrading JUNOS software?()
A. It will check the MD5 checksum of the install package.
B. It will check if the device meets the memory requirements for the install package.
C. It will check the compatibility of the configuration with the install package.
D. It will check if the device meets the storage requirement for the install package.
[单项选择]Which statement is correct regarding IPv6 addresses?()
A. An IPv6 address consists of 128 bits separated into eight 16-bit hexadecimal sections.
B. An IPv6 address consists of 64 bits separated into four 16-bit hexadecimal sections.
C. An IPv6 address consists of 128 bits separated into sixteen 8-bit hexadecimal sections.
D. An IPv6 address consists of 64 bits separated into eight 8-bit hexadecimal sections.
[单项选择]Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
A. You do not need to configure a RADIUS client policy.
B. You must know the exact model number of the Infranet Enforcer.
C. You must specify the NACN password of the device in the RADIUS client policy.
D. You do not need to designate a location group to which the Infranet Enforcer will belong.
[单项选择]Which statement is correct about a Routing Policy term?()
A. A term must contain a "from" statement.
B. A term acts like "if" and "then" statements.
C. The most specific term has precedence.
D. Terms can be written in any order to achieve the same behavior.
[单项选择]Which statement is correct about logical units on Juniper Router interfaces?()
A. Logical units are used only when a Layer 2 identifier is present such as a VLAN
B. A logical unit of 0 is required when using a frame-relay DLCI
C. A logical unit is always required
D. Logical units are not required unless ATM or 802.1Q VLAN tagging is configured.
[单项选择]Which statement is correct regarding the Junos OS?()
A. The same Junos OS image is used on all Junos devices.
B. The Junos OS provides separation between the control and forwarding planes.
C. Each Junos OS image is based on model-specific source code.
D. The Junos OS creates a secondary instance of the kernel to ensure redundancy.
[单项选择]Which statement is correct about policies in the Junos OS?()
A. Import policies are used to filter routes from the routing table to the forwarding table.
B. Import policies are used to filter routes destined for the routing table.
C. Import policies are used to filter routes being sent to neighboring devices.
D. Import policies are used to filter traffic entering the device.
[单项选择]Which statement is correct about HTTP trickling?()
A. It prevents the HTTP client or server from timing-out during an antivirus update
B. It prevents the HTTP client or server from timing-out during antivirus scanning.
C. It is an attack.
D. It is used to bypass antivirus scanners.
[单项选择]Which statement cannot be inferred from the passage
A. The mortality rate for breast cancer dropped.
B. The mortality rate among black women has increased.
C. The number of reported breast cancer cases is rising.
D. A woman’s lifetime risk of breast cancer is rising.
[单项选择]Which statement contains the correct parameters for a route-based IPsec VPN?()
A. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
B. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
C. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
D. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
[单项选择]Who invaded Britain first according to this passage
A. The Romans.
B. The Iberians.
C. The Gaels.
D. The Britons.
[单项选择]What does the writer imply according to the passage
A. Male elephants are hunted more than female elephants
B. Both male elephants and female elephants are equally hunted
C. Each elephant has a long life
D. There are not any ivory hunters in the world now.
[单项选择]Which statement can be the main idea of the passage
A. Glass is very useful because it has unusual qualities.
B. Light signals have changed the use of glass in industry.
C. Glass fibres have reduced the cost of telephone communication.
D. The use of glass fibres to carry telephone messages in an interesting new development.