更多"Identify a performance impact when "的相关试题:
[单项选择]When the BGP path selection process is being performed on a Cisco router, which BGP attribute is used first when determining the best path?()
A. local preference
B. MED
C. weight
D. or igin
E. next - hop
F. AS - path
[单项选择]Where are files queued for transmission when using the configuration archive transfer-on- commit function?()
A. /var/config
B. /var/queue
C. /var/transfer/queue
D. /var/transfer/config
[多项选择]What are two important considerations when using 2- or 4-channel 15216 OADMs?() (Choose two.)
A. All "Add" channels require uniform power levels.
B. The flexibility of wavelengths per OADM is limited.
C. It is easier to balance "Pass-Through" and "Add" channels.
D. There is lower pass-through loss using multi-channel OADMs.
E. You can extract a single channel without dropping other channels.
[单项选择]When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
B. Configure the supplicant as anexternal authentication server
C. Configure RADIUS proxy on the realm
D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service
[单项选择]When using keyboard shortcuts, which keystroke combination allows users to erase a single word to the left of the cursor?()
A. Ctrl + a
B. Ctrl + e
C. Ctrl + u
D. Ctrl + w
[单项选择]When using keyboard shortcuts, which single keystroke combination allows users to erase the entire current command?()
A. Ctrl + a
B. Ctrl + e
C. Ctrl + u
D. Ctrl + w
[单项选择]When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()
A. snoop
B. tcpdump
C. monitor
D. tail
[多项选择]What are two requirements when using Packet Flow Acceleration? ()(Choose two.)
A. Traffic needs be compressed.
B. Quality of service must be enabled.
C. A service tunnel must exist in at least one direction.
D. PFA must be enabled on the client-side WX device.
[单项选择]When using CHKDSK, which of the following parameters locks the volume, locates bad sectorsand recovers readable information?()
A. /r
B. /f
C. /i
D. /x
[多项选择]Which two statements are true when using the configure exclusive CLI command?()
A. Multiple users can enter configuration mode and have their own private configuration.
B. When a user commits, only the user's changes are committed.
C. A message indicates which other users are in configuration mode and what portion of the configuration they are editing.
D. Only a single user can edit the configuration.
[单项选择]When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()
A. An error will occur.
B. Data passed between the client and the server is encrypted.
C. User IDs and passwords are passed to the server unencrypted.
D. User IDs and passwords are encrypted before they are passed to the server.
[单项选择]Which statement is true when logging in using the WebUI? ()
A. Port 80 for HTTP is enabled by default.
B. Port 443 for HTTPS is enabled by default.
C. Port 8090 for HTTP is enabled by default.
D. Both HTTP and HTTPS are enabled using their standard port values.
[单项选择]When building an IP multicast domain using PIM which mode assumes that other routers do not want to forward multicast packets for the group?()
A. PIM - DM
B. PIM - SM
C. PIM - RP
D. CGMP
E. IGMP snooping
[单项选择]What is a valid option when using the ping command?()
A. packet loss
B. packet size
C. CRC
D. TCP port
[单项选择]When using OSPF as your IGP, which operational command must be enabled to populate the TED forCSPF calculations?()
A. cspf enable
B. disable no-cspf
C. traffic-engineering
D. enable traffic-engineering-database