更多“多选题What are two valid actions for routing policy?()AdiscardBnext policyCacceptDignore”相关问题
  • 第1题:

    What does RPL stand for?()

    • A、routing primary language
    • B、routing policy language
    • C、routing police language
    • D、routing program language
    • E、routing protocol language

    正确答案:B

  • 第2题:

    What are two valid match criteria for a routing policy?()

    • A、OSPF area ID
    • B、prefix list
    • C、port
    • D、time-to-live (TTL)

    正确答案:A,B

  • 第3题:

    What are two reasons why a route might be hidden?()

    • A、route preference
    • B、routing loop
    • C、invalid next hop
    • D、routing policy

    正确答案:C,D

  • 第4题:

    What are two valid match criteria for a routing policy? ()

    • A、OSPF are a ID
    • B、prefix list
    • C、port
    • D、time-to-live(TTL)

    正确答案:A,C

  • 第5题:

    多选题
    Bye default, what are three valid routing tables? ()
    A

    inet.0

    B

    inet4.0

    C

    inet.6

    D

    inet6.0

    E

    inet.3


    正确答案: D,B
    解析: 暂无解析

  • 第6题:

    多选题
    What are two rulebase types within an IPS policy on an SRX Series device?() (Choose two.)
    A

    rulebase-ips

    B

    rulebase-ignore

    C

    rulebase-idp

    D

    rulebase-exempt


    正确答案: D,C
    解析: 暂无解析

  • 第7题:

    多选题
    Which two policy actions are considered flow control actions?()
    A

    reject

    B

    community add

    C

    next term

    D

    next policy


    正确答案: B,A
    解析: 暂无解析

  • 第8题:

    多选题
    What are two valid match criteria for a routing policy? ()
    A

    OSPF are a ID

    B

    prefix list

    C

    port

    D

    time-to-live(TTL)


    正确答案: A,C
    解析: 暂无解析

  • 第9题:

    多选题
    What are two valid match criteria for a routing policy?()
    A

    OSPF area ID

    B

    prefix list

    C

    port

    D

    time-to-live (TTL)


    正确答案: A,D
    解析: 暂无解析

  • 第10题:

    多选题
    What are two reasons why a route might be hidden?()
    A

    route preference

    B

    routing loop

    C

    invalid next hop

    D

    routing policy


    正确答案: C,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about terms in a routing policy?()
    A

    A routing policy cannot have more than one term.

    B

    If a term does not contain a from statement, all routes match.

    C

    If a term does not contain a from statement, the Junos OS will not commit.

    D

    A then statement is not mandatory in a term.


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    多选题
    You need to configure the security settings for the new app servers.  Which two actions should you perform?()
    A

    Create a Group policy object (GPO) for the web servers.

    B

    Create a Group policy object (GPO) for the database servers.

    C

    Modify the Default Domain Policy.

    D

    Modify the Default Domain Controllers Policy.


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    What are two components of the Junos software architecture? ()(Choose two.)

    • A、Linux kernel
    • B、routing protocol daemon
    • C、session-based forwarding module
    • D、separate routing and security planes

    正确答案:B,C

  • 第14题:

    Which two security policy actions are valid?()

    • A、deny
    • B、discard
    • C、reject
    • D、close

    正确答案:A,C

  • 第15题:

    Which two policy actions are considered flow control actions?()

    • A、reject
    • B、community add
    • C、next term
    • D、next policy

    正确答案:C,D

  • 第16题:

    What are two valid actions for a routing policy?()

    • A、discard
    • B、next policy
    • C、accept
    • D、ignore

    正确答案:B,C

  • 第17题:

    多选题
    What are two default routing policies on Junos devices?()
    A

    The BGP import policy accepts all BGP routes.

    B

    The BGP export policy rejects all active BGP routes.

    C

    The OSPF import policy accepts all OSPF routes.

    D

    The OSPF export policy accepts all active OSPF routes.


    正确答案: A,D
    解析: 暂无解析

  • 第18题:

    多选题
    What are two valid Cluster load balancing methods? ()(Choose two.)
    A

    urlhash

    B

    backup chaining

    C

    least connections

    D

    fewest outstanding requests


    正确答案: A,D
    解析: 暂无解析

  • 第19题:

    多选题
    Which two security policy actions are valid?()
    A

    deny

    B

    discard

    C

    reject

    D

    close


    正确答案: A,D
    解析: 暂无解析

  • 第20题:

    多选题
    You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()
    A

    Delegate the password management controls to the help desk staff.

    B

    Delegate the password management controls to the Domain Users group.

    C

    Configure the Default Domain Policy to enforce password expiration settings.

    D

    Configure the Default Domain Controller Policy to enforce password expiration settings.


    正确答案: A,C
    解析: 暂无解析

  • 第21题:

    多选题
    What are two valid initial configuration methods supported on Juniper routers?()
    A

    CLI

    B

    J-Web

    C

    JUNOScope

    D

    PCMCIA flash card


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    多选题
    What are two valid actions for a routing policy?()
    A

    discard

    B

    next policy

    C

    accept

    D

    ignore


    正确答案: A,C
    解析: 暂无解析

  • 第23题:

    多选题
    By default, what are three valid routing tables?()
    A

    inet.0

    B

    inet4.0

    C

    inet.6

    D

    inet6.0

    E

    inet.3


    正确答案: D,E
    解析: 暂无解析

  • 第24题:

    多选题
    What are two components of the Junos software architecture? ()(Choose two.)
    A

    Linux kernel

    B

    routing protocol daemon

    C

    session-based forwarding module

    D

    separate routing and security planes


    正确答案: C,A
    解析: 暂无解析