多选题In JUNOS Software, which three packet elements can be inspected to determine if asession already exists?()AIP protocolBIP time-to-liveCsource and destination IP addressDsource and destination MAC addressEsource and destination TCP/UDP port

题目
多选题
In JUNOS Software, which three packet elements can be inspected to determine if asession already exists?()
A

IP protocol

B

IP time-to-live

C

source and destination IP address

D

source and destination MAC address

E

source and destination TCP/UDP port


相似考题
更多“多选题In JUNOS Software, which three packet elements can be inspected to determine if asession already exists?()AIP protocolBIP time-to-liveCsource and destination IP addressDsource and destination MAC addressEsource and destination TCP/UDP port”相关问题
  • 第1题:

    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

    A.protocol

    B.VLAN number

    C.TCP or UDP port numbers

    D.source switch port number

    E.source IP address and destination IP address

    F.source MAC address and destination MAC address


    参考答案:A, C, E

  • 第2题:

    关于高级访问列表中的destination-port参数,下面描述正确的是()

    • A、Destination-port是可选参数
    • B、Destination-port用于指定UDP或TCP报文的源端口信息
    • C、仅仅在规则指定的协议号是TCP或者UDP时有效
    • D、如果不指定,表示TCP/UDP报文的任何目的端口信息都匹配

    正确答案:A,C,D

  • 第3题:

    If an edge Label Switch Router (LSR) is properly configured,which three combinations are possible?()

    • A、A received IP packet is forwarded based on the IP destination address and the packet is sent as an IP packet.
    • B、An IP destination exists in the IP forwarding table. A received labeled packet is dropped because the label is not found in the LFIB table.
    • C、There is an MPLS label-switched path toward the destination. A received IP packet is dropped because the destination is not found in the IP forwarding table.
    • D、A received IP packet is forwarded based on the IP destination address and the packet is sent as a labeled packet.
    • E、A received labeled IP packet is forwarded based upon both the label and the IP address.
    • F、A received labeled packet is forwarded based on the label. After the label is swapped,the newly labeled packet is sent.

    正确答案:A,D,F

  • 第4题:

    The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch,there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing? ()

    • A、source IP address
    • B、destination IP address
    • C、per-packet load balance
    • D、destination MAC address
    • E、source MAC address

    正确答案:A,B,D,E

  • 第5题:

    What does a Layer 2 switch use to decide where to forward a received frame?()

    • A、source MAC address
    • B、source IP address
    • C、source switch port
    • D、destination IP address
    • E、destination port address
    • F、destination MAC address

    正确答案:F

  • 第6题:

    Which statements are valid for a local SPAN configuration? ()

    • A、 Source and destination interface must be on the same host
    • B、 Source and destination interfaces can be on different hosts
    • C、 Destination vEthernet interface can be on a different VLAN than the source
    • D、 Destination interface can be a physical port
    • E、 Destination interface cannot be a physical port

    正确答案:A,D

  • 第7题:

    Firewall filters can be used to accept, discard, or reject packets based on ()

    • A、protocol type
    • B、MAC address
    • C、TCP or UDP port
    • D、source and destination IP address

    正确答案:A,C,D

  • 第8题:

    On which destination port in the Layer 4 header does BGP listen?()

    • A、UDP port 169
    • B、TCP port 169
    • C、UDP port 179
    • D、TCP port 179

    正确答案:D

  • 第9题:

    多选题
    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
    A

    protocol

    B

    VLAN number

    C

    TCP or UDP port numbers

    D

    source switch port number

    E

    source IP address and destination IP address

    F

    source MAC address and destination MAC address


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)
    A

    IP protocol

    B

    IP time-to-live

    C

    source and destination IP address

    D

    source and destination MAC address

    E

    source and destination TCP/UDP port


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    单选题
    Which of one the following fields is contained within an IEEE Ethernet frame header?()
    A

    source and destination MAC address

    B

    source MAC address and destination network address only

    C

    source and destination network address only

    D

    source network address and destination MAC address

    E

    source and destination MAC address and source and destination network address


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    If an edge Label Switch Router (LSR) is properly configured,which three combinations are possible?()
    A

    A received IP packet is forwarded based on the IP destination address and the packet is sent as an IP packet.

    B

    An IP destination exists in the IP forwarding table. A received labeled packet is dropped because the label is not found in the LFIB table.

    C

    There is an MPLS label-switched path toward the destination. A received IP packet is dropped because the destination is not found in the IP forwarding table.

    D

    A received IP packet is forwarded based on the IP destination address and the packet is sent as a labeled packet.

    E

    A received labeled IP packet is forwarded based upon both the label and the IP address.

    F

    A received labeled packet is forwarded based on the label. After the label is swapped,the newly labeled packet is sent.


    正确答案: F,A
    解析: 暂无解析

  • 第13题:

    关于高级访问列表中的destination-port参数,下面描述正确的是()

    A.Destination-port是可选参数

    B.Destination-port用于指定UDP或TCP报文的源端口信息

    C.仅仅在规则指定的协议号是TCP或者UDP时有效

    D.如果不指定,表示TCP/UDP报文的任何目的端口信息都匹配


    参考答案:A, C, D

  • 第14题:

    Which of the following descriptions about IP spoofing is correct?()

    • A、IP source address is forged
    • B、IP destination address is forged
    • C、IP TCP source port is forged
    • D、IP TCP destination port is forged
    • E、None of above

    正确答案:A

  • 第15题:

    下面能够表示"禁止从129.9.0.0网段中的主机建立与202.38.16.0网段内的主机的WWW端口的连接"的访问控制列表是()。

    • A、acl101 rule deny tcp source129.9.0.00.0.255.255 destination 202.38.16.00.0.0.255 destination-port equal www
    • B、acl101 rule deny tcp source129.9.0.00.0.255.255 destination 202.38.16.00.0.0.255 destination-port equal 80
    • C、acl100 rule deny udp source129.9.0.00.0.255.255 destination 202.38.16.00.0.0.255 destination-port equal www
    • D、acl99 rule deny udp source129.9.0.00.0.255.255 destination 202.38.16.00.0.0.255 destination-port equal www

    正确答案:A,B

  • 第16题:

    You work as a network technician at Company. Your boss, Mrs., is interested in  LWAPP (Lightweight Access Point Protocol).  What should you tell her regarding this technology?  ()

    • A、 LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.
    • B、 Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port  of 12223.
    • C、 Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address  using DHCP.
    • D、 Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of  12223.
    • E、 Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port  of 12223.
    • F、 Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of  12223.

    正确答案:B,C

  • 第17题:

    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

    • A、protocol
    • B、VLAN number
    • C、TCP or UDP port numbers
    • D、source switch port number
    • E、source IP address and destination IP address
    • F、source MAC address and destination MAC address

    正确答案:A,C,E

  • 第18题:

    In JUNOS Software, which three packet elements can be inspected to determine if asession already exists?()

    • A、IP protocol
    • B、IP time-to-live
    • C、source and destination IP address
    • D、source and destination MAC address
    • E、source and destination TCP/UDP port

    正确答案:A,C,E

  • 第19题:

    In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)

    • A、IP protocol
    • B、IP time-to-live
    • C、source and destination IP address
    • D、source and destination MAC address
    • E、source and destination TCP/UDP port

    正确答案:A,C,E

  • 第20题:

    多选题
    In JUNOS Software, which three packet elements can be inspected to determine if asession already exists?()
    A

    IP protocol

    B

    IP time-to-live

    C

    source and destination IP address

    D

    source and destination MAC address

    E

    source and destination TCP/UDP port


    正确答案: D,B
    解析: 暂无解析

  • 第21题:

    多选题
    You work as a network technician at Company. Your boss, Mrs., is interested in  LWAPP (Lightweight Access Point Protocol).  What should you tell her regarding this technology?  ()
    A

    LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.

    B

    Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port  of 12223.

    C

    Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address  using DHCP.

    D

    Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of  12223.

    E

    Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port  of 12223.

    F

    Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of  12223.


    正确答案: B,E
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following descriptions about IP spoofing is correct?()
    A

    IP source address is forged

    B

    IP destination address is forged

    C

    IP TCP source port is forged

    D

    IP TCP destination port is forged

    E

    None of above


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    下面能够表示"禁止从129.9.0.0网段中的主机建立与202.38.16.0网段内的主机的WWW端口的连接"的访问控制列表是()。
    A

    acl101 rule deny tcp source129.9.0.00.0.255.255 destination 202.38.16.00.0.0.255 destination-port equal www

    B

    acl101 rule deny tcp source129.9.0.00.0.255.255 destination 202.38.16.00.0.0.255 destination-port equal 80

    C

    acl100 rule deny udp source129.9.0.00.0.255.255 destination 202.38.16.00.0.0.255 destination-port equal www

    D

    acl99 rule deny udp source129.9.0.00.0.255.255 destination 202.38.16.00.0.0.255 destination-port equal www


    正确答案: D,A
    解析: 暂无解析

  • 第24题:

    多选题
    Firewall filters can perform which two actions?()
    A

    Log packet.

    B

    Count packet.

    C

    Set packet metric.

    D

    Decrement packet TTL.

    E

    Change destination IP address.


    正确答案: E,D
    解析: 暂无解析