Exception traffic is only handled by the PFE
Exception traffic is rate-limited across the internal link to protect the RE
Exception traffic is not prioritized during times of congestion
Exception traffic is forwarded based on forwarding table entries
第1题:
A. It sends the traffic through one egress port toward its destination
B. It sends the traffic through multiple egress ports to all available receivers
C. It sends the traffic through an internal link to the RE
D. It sends the traffic to the local system for further processing
第2题:
A.The Routing Engine handles all exception traffic.
B.The Routing Engine synchronizes the route table with the PFE
C.The Routing Engine is hot-pluggable.
D.The Routing Engine controls the PFE
第3题:
Which statement is most correct regarding vNICs and VLANs?()
第4题:
Which statement is correct regarding exception traffic processing?()
第5题:
Which statement describes exception traffic?()
第6题:
What are two examples of RE exception traffic?()
第7题:
The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.
The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.
The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.
The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.
第8题:
only the default vlan has traffic that is tagged
All vNICs have to be associated with one or more VLANs except for the default vlan
vlan must be configured before configuring them into a vNIC
Tagging is done by the operating system NIC if the flag is set to tag traffic
第9题:
Exception traffic is only handled by the PFE
Exception traffic is rate-limited across the internal link to protect the RE
Exception traffic is not prioritized during times of congestion
Exception traffic is forwarded based on forwarding table entries
第10题:
if enabled, all HTTPS traffic must be decrypted
if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
object size can be used to determine whether the HTTPS traffic is to be decrypted
第11题:
A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.
A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.
A sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.
A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.
A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.
第12题:
Transit traffic is handled by the RE only
Transit traffic is handled by the PFE only
Transit traffic is handled by both the RE and the PFE
Transit traffic is not handled by the RE or the PFE
第13题:
A.It is only used for exception traffic.
B.It is an FE link called fxp2.
C.It is rate-limited to avoid DDOS attacks.
D.It is only used to send the forwarding-table from the Routing Engine to the Packet-Forwarding Engine.
第14题:
Which statement is correct about an OSPF sham-link?()
第15题:
How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()
第16题:
In the Junos OS, what handles transit traffic?()
第17题:
Which two statements regarding JUNOS architecture are correct?()
第18题:
You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000. You need to configure Microsoft Windows Firewall to allow traffic for the application. What should you do? ()
第19题:
Add a port exception for port 80.
Disable the Core Networking exception.
Restore the Windows Firewall defaults.
Add a program exception for the new application.
第20题:
It sends the traffic through one egress port toward its destination
It sends the traffic through multiple egress ports to all available receivers
It sends the traffic through an internal link to the RE
It sends the traffic to the local system for further processing
第21题:
It is only used for exception traffic.
It is an FE link called fxp2.
It is rate-limited to avoid DDOS attacks.
It is only used to send the forwarding-table from the Routing Engine to the Packet-Forwarding Engine.
第22题:
Exception traffic must be sent to the PFE for processing.
Exception traffic enters one ingress port and is sent out multiple egress ports.
Exception traffic is rate-limited on the internal link to prevent DoS attacks.
Exception traffic is processed after forwarding traffic when congestion exists.
第23题:
The Routing Engine handles all exception traffic.
The Routing Engine synchronizes the route table with the PFE
The Routing Engine is hot-pluggable.
The Routing Engine controls the PFE
第24题:
Traffic matching the default route will use 10.1.1.1 as the next hop.
Traffic matching the default route will use 10.1.1.254 as the next hop.
Traffic matching the default route will be load-balanced per packet across both next hops.
Traffic matching the default route will be load-balanced per flow across both next hops.