Which statement about access lists that are applied to an interface is true?()
第1题:
A.access-list 10 permit 172.29.16.0 0.0.0.255
B.access-list 10 permit 172.29.16.0 0.0.1.255
C.access-list 10 permit 172.29.16.0 0.0.3.255
D.access-list 10 permit 172.29.16.0 0.0.15.255
E.access-list 10 permit 172.29.0.0 0.0.255.255
第2题:
Which statement about WSA access logs that are to be processed by sawmill for cisco ironport istrue?()
第3题:
Which statement is true about IBGP routers? ()
第4题:
The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()
第5题:
Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()
第6题:
Which statement about access lists that are applied to an interface is true?()
第7题:
Which statement is TRUE about the CacheFactory class ?()
第8题:
it is a topology agnostic way to access NamedCaches
it provides mechanisms to manage underlying remote data sources
both A and B are TRUE
Neither A nor B are TRUE
第9题:
A then statement is mandatory in a term
If a term does not contain a from statement, all routers match
If a term does not contain a from statement, the Junos OS will not commit
A then statement is not mandatory in a term
第10题:
The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.
LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.
LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.
LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN
第11题:
the default log format can be used
the fields%XC%X n must be appended to the default access log format
any log format can beused , but all WSAs must use the same format
any log format can be used. And different WSAs may use different formats
第12题:
VIP is not required when using only agentless access for all endpoint platforms.
VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.
VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.
VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.
第13题:
Which statement about the S-Series native FTP proxy is not true?()
第14题:
Which statement about a Service Profile is most accurate?()
第15题:
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()
第16题:
Which statement regarding the site-survey process is correct?()
第17题:
Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect()。
第18题:
Which two statements are true about terms in a routing policy?()
第19题:
associated with a pool of blades
represents a group of physical blades
stores connectivity requirements
第20题:
you can apply multiple access lists with the same protocol or in different…
you can config one access list,per direction,per layer 3 protocol
you can placeasmanyaccess lists as you want on any interface
you can apply ony one access list on any interface
第21题:
Real-time frame exchange is accomplished within the access point.
The control traffic between the client and the access point is encapsulated with the LWAPP.
Authentication, security, and mobility are handled by the access point.
Data traffic between the client and the access point is encapsulated with LWAPP.
None of the other alternatives apply
第22题:
you can apply multiple access lists with the same protocol or in different direction.
you can config one access list,per direction,per layer 3 protocol
you can place as many access lists as you want on any interface
you can apply only one access list on any interface
第23题:
both active and passive modes FTP are supported
by default the FTP proxy uses port 8021
access polices may apply to native FTP traffic
data loss prevention policies may apply to native FTP traffic
authentication is supported in transparent mode
第24题:
The data traffic between the access point and controller is not encrypted.
The data traffic is encapsulated with LWAPP.
The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
The data traffic is encrypted with AES.
All of the above