网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which statement is true regarding redundancy groups?()
A
The preempt option determines the primary and secondary roles for redundancy group 0 during a failure and recovery scenario.
B
When priority settings are equal and the members participating in a cluster are initialized at the same time, the primary role for redundancy group 0 is assigned to node 1.
C
The primary role can be shared for redundancy group 0 when the active-active option is enabled.
D
Redundancy group 0 manages the control plane failover between the nodes of a cluster.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which statement is true regarding redundancy groups?()A The preempt option determines the primary and secondary roles for redundancy group 0 during a failure and recovery scenario.B When priority settings are equal and the members participating in a cluster are initialized at the same time, the primary role for redundancy group 0 is assigned to node 1.C The primary role can be shared for redundancy group 0 when the active-active option is enabled.D Redundancy group 0 manages the control plane failover between the nodes of a cluster.” 相关考题
考题
单选题What is a redundancy group in JUNOS Software?()A
a set of chassis clusters that fail over as a groupB
a set of devices that participate in a chassis clusterC
a set of VRRP neighbors that fail over as a groupD
a set of chassis cluster objects that fail over as a group
考题
单选题Which statement is true about source NAT?()A
Source NAT works only with source pools.B
Destination NAT is required to translate the reply traffic.C
Source NAT does not require a security policy to function.D
The egress interface IP address can be used for source NAT
考题
单选题Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing asecurity policy change?()A
policy-rematchB
policy-evaluateC
rematch-policyD
evaluate-policy
考题
多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication
考题
多选题Which three parameters are configured in the IKE policy?()AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings
考题
单选题Where do you configure SCREEN options?()A
zones on which an attack might arriveB
zones you want to protect from attackC
interfaces on which an attack might arriveD
interfaces you want to protect from attack
考题
单选题What is the functionality of redundant interfaces (reth) in a chassis cluster?()A
reth interfaces are used only for VRRP.B
reth interfaces are the same as physical interfaces.C
reth interfaces are pseudo-interfaces that are considered the parent interface for two physical interfaces.D
Each cluster member has a reth interface that can be used to share session state information with the other cluster members.
考题
多选题Users can define policy to control traffic flow between which two components?()Afrom a zone to the device itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface
热门标签
最新试卷