更多“What are three methods for managing a Juniper Enterprise Router?()A、CUB、SDXC、SAPD、J-WebE、J-Config”相关问题
  • 第1题:

    What methods are available to create separate multicast and unicast forwarding topologies on a Juniper Networks router?()

    • A、MBGP
    • B、RIB groups
    • C、Routing policy
    • D、Firewall filters

    正确答案:A,B

  • 第2题:

    On a Juniper router,what is the default file used for syslog messages?()

    • A、system
    • B、errors
    • C、security
    • D、messages

    正确答案:D

  • 第3题:

    What are the three OSPF authentication methods supported on the ERX Edge Router?()

    • A、 null password
    • B、 simple password
    • C、 message digest 5
    • D、 Password Authentication Protocol
    • E、 Challenge Handshake Authentication Protocol

    正确答案:A,B,C

  • 第4题:

    What are three primary activities in the cycle of building an enterprise security strategy?()

    • A、activity audit
    • B、administration
    • C、policy establishment
    • D、technology implementation

    正确答案:A,C,D

  • 第5题:

    Which three are used to create a separate multicast and unicast forwarding topology on a Juniper Networks router?()

    • A、MBGP
    • B、RIB groups
    • C、firewall filters
    • D、routing policy
    • E、filter based forwarding (FBF)

    正确答案:A,B,D

  • 第6题:

    How many committed configuration files are stored on the Juniper Networks enterprise router?()

    • A、4
    • B、15
    • C、48
    • D、50

    正确答案:D

  • 第7题:

    You have three databases, FINDB, PAYDB and ADMINDB, located in Sydney, Tokyo and Singapore respectively. You want to perform administrative tasks which include starting up and shutting down the databases, creating and managing tablespaces and database users, and taking regular backups, for all of the three databases from London. Which component must be enabled and running on each host machine to achieve your objective?()

    • A、Oracle Management Agent
    • B、Enterprise Manager with Grid Control
    • C、Enterprise Manager with Database Control
    • D、Operating System Socket for incoming requests
    • E、Real Application Cluster (RAC) with three instances
    • F、Enterprise Manager with Generic Database Management

    正确答案:A

  • 第8题:

    多选题
    What are three methods for managing a Juniper Enterprise Router?()
    A

    CU

    B

    SDX

    C

    SAP

    D

    J-Web

    E

    J-Config


    正确答案: D,B
    解析: 暂无解析

  • 第9题:

    多选题
    What are the three OSPF authentication methods supported on the ERX Edge Router?()
    A

    null password

    B

    simple password

    C

    message digest 5

    D

    Password Authentication Protocol

    E

    Challenge Handshake Authentication Protocol


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which three are used to create a separate multicast and unicast forwarding topology on a Juniper Networks router?()
    A

    MBGP

    B

    RIB groups

    C

    firewall filters

    D

    routing policy

    E

    filter based forwarding (FBF)


    正确答案: B,E
    解析: 暂无解析

  • 第11题:

    多选题
    What are three methods that may be use d to allow a switch to determine which ports to forward IP multicast messages to?()
    A

    IGMP

    B

    IGMP snooping

    C

    PIM

    D

    CGMP

    E

    static assignment

    F

    CDP


    正确答案: E,F
    解析: 暂无解析

  • 第12题:

    多选题
    What are three ways an IP interface can be assigned to a virtual router in a PPP over ATM environment? ()(Choose three.)
    A

    profile

    B

    policy list

    C

    domain map

    D

    RADIUS VSA

    E

    classifier ACL


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    What are two methods of accessing a Juniper enterprise router?()

    • A、RSH
    • B、HTTPS
    • C、console
    • D、J-Config

    正确答案:B,C

  • 第14题:

    What are three Juniper DX Cluster benefits?() (Choose three.)

    • A、performance
    • B、authorization
    • C、compression
    • D、protocol validation
    • E、UDP load balancing

    正确答案:A,C,D

  • 第15题:

    Which two statements regarding system logging on a Juniper enterprise router are correct?()

    • A、The system log has a proprietary format.
    • B、System logs must be sent to a remote device.
    • C、New system logs can be created and archived.
    • D、Most software processes create their own logs.

    正确答案:C,D

  • 第16题:

    By default, what does a Juniper Networks router set the BGP origin code to when originating theroute?()

    • A、IGP (Value 0)
    • B、EGP (Value 1)
    • C、Incomplete (Value 2)
    • D、It depends on the route's source.

    正确答案:A

  • 第17题:

    What are three ways an IP interface can be assigned to a virtual router in a PPP over ATM environment? ()(Choose three.)

    • A、profile
    • B、policy list
    • C、domain map
    • D、RADIUS VSA
    • E、classifier ACL

    正确答案:A,C,D

  • 第18题:

    What are two valid initial configuration methods supported on Juniper routers?()

    • A、CLI
    • B、J-Web
    • C、JUNOScope
    • D、PCMCIA flash card

    正确答案:A,B

  • 第19题:

    单选题
    How many committed configuration files are stored on the Juniper Networks enterprise router?()
    A

    4

    B

    15

    C

    48

    D

    50


    正确答案: B
    解析: 暂无解析

  • 第20题:

    多选题
    What are two methods of accessing a Juniper enterprise router?()
    A

    RSH

    B

    HTTPS

    C

    console

    D

    J-Config


    正确答案: D,B
    解析: 暂无解析

  • 第21题:

    多选题
    What are three methods to apply a L2TP Tunnel Switch Profile? ()(Choose three.)
    A

    aaa domain-map

    B

    radius attributes

    C

    tunnel groups

    D

    tunnel services profile

    E

    l2tp destination profile


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    多选题
    What are two methods of taking a binary backup of a Mysql Server using InnoDB storage engine?()
    A

    File system snapshots

    B

    Mysqldumpslow

    C

    Mysqlhotcopy

    D

    Mysqldump with – binary-data option

    E

    Mysql Enterprise Backup


    正确答案: C,B
    解析: 暂无解析

  • 第23题:

    多选题
    What are three valid Juniper Networks IPS attack object types?() (Choose three.)
    A

    signature

    B

    anomaly

    C

    trojan

    D

    virus

    E

    chain


    正确答案: A,D
    解析: 暂无解析