performance
authorization
compression
protocol validation
UDP load balancing
第1题:
Which of the following are types of flow control? (Choose three)
A.Buffering
B.Cut-through
C.Windowing
D.Congestion avoidance
E.Load balancing
第2题:
What are three Juniper DX Cluster benefits?() (Choose three.)
第3题:
Which of the following are types of flow control (Choose three.)()。
第4题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()
第5题:
buffering
cut-through
windowing
congestion avoidance
load balancing
第6题:
AppRule counters
new SSL sessions
connections to target server
total number of 200 responses
average download time per page
第7题:
Good load balancing between Presentation Tier and Object Tier
Easy administration
Flexible Load balancing
Optimal performance
Simple security
第8题:
onboard VPN accelerator
events correlation and proactive response
high-performance AIM VPN modules
virtual firewall
Cisco lOS Firewall and lOS IPS
transparent firewall
第9题:
no-import
no-export
no-advertise
no-export-subconfed
no-import-subconfed
第10题:
severity level
facility
log message name
time stamp
error codes
access privilege
第11题:
dispersion
Optical SNR
span attenuation
four wave mixing
receiver sensitivity
第12题:
Area ID
N-selector
System ID
ISO number
MAC address
第13题:
What are two valid Cluster load balancing methods? ()(Choose two.)
第14题:
What are three valid Juniper Networks IPS attack object types?() (Choose three.)
第15题:
What are three benefits of using ASM?()
第16题:
using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks
automatic reconfiguration s of the security devices based on current security threats
containment and control of security threats
application security
anti-x defense F- virtual firewall
第17题:
performance
authorization
compression
protocol validation
UDP load balancing
第18题:
urlhash
backup chaining
least connections
fewest outstanding requests
第19题:
integrated security
collaborative security system
self provisioning
Adaptive Threat Defense
programmable security ASICs
Cisco lOS-based security
第20题:
throughput
performance
pass-through
application summary
packet size distribution
第21题:
zone objects
policy objects
attack objects
alert and notify objects
network and address objects
第22题:
fiber dispersion
signal attenuation
transmitter power
amplifier bandwidth
receiver dispersion tolerance
第23题:
Create a new rule for TCP port 80 by using the Network Load Balancing Cluster console
Run the wlbs disable command on the cluster nodes
Assign a unique port rule for NLB cluster by using the NLB Cluster console
Delete the default port rules through Network Load Balancing Cluster console
第24题:
signature
anomaly
trojan
virus
chain