问题:单选题Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/...
查看答案
问题:单选题Which statement is true about interface-based static NAT? ()A It also supports PAT.B It requires you to configure address entries in the junos-nat zone.C It requires you to configure address entries in the junos-global zone.D The IP addresses being tra...
问题:多选题Which two are components of the enhanced services software architecture?() (Choose two.)ALinux kernelBrouting protocol daemonCsession-based forwarding moduleDseparate routing and security planes...
问题:多选题Which three parameters are configured in the IKE policy?() (Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings...
问题:单选题Click the Exhibit button. Which type of source NAT is configured in the exhibit?()A static source poolB interface source poolC source pool with PATD souce pool without PAT...
问题:单选题Click the Exhibit button. In the exhibit, what is the priority for Router B in VRRP group 100?()A 1B 100C 110D 255...
问题:单选题You are not able to telnet to the interface IP of your JUNOS software with enhanced services devicefrom a PC on the same subnet. What is causing the problem? ()A Telnet is not being permitted by self policy.B Telnet is not being permitted by security p...
问题:多选题In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)AIP protocolBIP time-to-liveCsource and destination IP addressDsource and destination MAC addressEsource and d...
问题:单选题You want to create a policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in theUntrust zone. How do you do create this policy? ()A Specify the IP address (172.19.1.1/32) as the destination address in the policy.B Sp...
问题:多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS...
问题:单选题Click the Exhibit button. In the exhibit, which statement is correct? ()A Three physical interfaces are redundant.B You must define an additional Redundancy Group.C node 0 will immediately become primary in the cluster.D You must issue an operation...
问题:多选题Which two are characteristics of link-state routing protocols?() (Choose two.)ARouters choose a best path for a destination based on the SPF algorithm.BAll routers in a given area or level build a consistent database describing the network's topology.C...
问题:多选题Which two statements regarding asymmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different ke...
问题:单选题Click the Exhibit button. Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2. Which is a potential cause for this problem?()A The untrust zone does not have a management policy configured.B The trust zone does not have ping enabled as ...