更多"Which two methods are used to assig"的相关试题:
[多项选择]Which two methods are used to assign an IP address to a WX device? ()(Choose two.)
A. SSH
B. Telnet
C. WebView
D. device front panel
E. serial console (command-line interface)
[多项选择]Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
[多项选择]Which of the following methods can be used to apply a file system to a hard drive partition?()
A. Device Manager MMC
B. Format Command
C. Disk Management MMC
D. Windows Explorer Menus
E. FDISK Command
[多项选择]Which two forwarding classes have bandwidth assigned when CoS is not explicitly configured inJUNOS software?()
A. best effort (BE)
B. network control (NC)
C. assured forwarding (AF)
D. expedited forwarding (EF)
[多项选择]Which two external authentication methods are supported by the Junos OS for user authentication?()
A. RADIUS
B. KERBEROS
C. IPsec
D. TACACS+
[单项选择]Which of the following methods is used to increase the number of processes sharing the CPU ?()
A. Interrupt
B. Scheduler
C. Swapping
D. Working Set
[单项选择]Which of the following methods is used to provide a standard to measure performance
A. Benchmarkin
B. Samplin
C. Estimatin
D. Levelin
[多项选择]Which two methods advertise internal networks to external ISPs via BGP?()
A. using aggregate routes
B. defining routes via the network statement
C. disablin g synchronization
D. forcing the next - hop address
[多项选择]Which two queuing methods are supported by outbound QoS?() (Choose two.)
A. weighted fair priority
B. weighted fair queuing
C. weighted strict priority
D. weighted strict queuing
[多项选择]Which two wireless encryption methods are based on the RC4 encryption algorithm? ()
A. WEP
B. CCKM
C. AES
D. TKIP
E. CCMP
[多项选择]Which two secure remote access methods are available on the WX platforms?() (Choose two.)
A. SSL
B. SSH
C. Telnet
D. HTTP
[多项选择]Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()
A. DMVPN
B. MPLS VPN
C. Virtual Tunnel Interface (VTI)
D. SSL VPN
E. PPPoE
[单项选择]Which utility is used to assign a flow of data to a traffic class?()
A. ip profile
B. policy-list
C. classifier-list
D. rate-limit-profile
[多项选择]In JUNOS software, which two are methods of restricting multicast traffic beyond your domain? ()
A. MSDP
B. Routing policy
C. Administrative scoping
D. Bootstrap export policy
[多项选择]Which two commands are used during the password recovery process?()
A. clear system login
B. boot -s
C. recovery
D. delete system root-authentication
[多项选择]Which two values are used by Spanning Tree Protocol to elect a root bridge?()
A. amount of RAM
B. bridge priority
C. IOS version
D. IP address
E. MAC address
F. speed of the links