网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which three JUNOS software features allow for increased security on your network?()
A

firewall filters

B

data encryption

C

routing protocol authentication

D

support for BGP path mtu discovery

E

automatic discovery for IPSEC neighbors


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which three JUNOS software features allow for increased security on your network?()Afirewall filtersBdata encryptionCrouting protocol authenticationDsupport for BGP path mtu discoveryEautomatic discovery for IPSEC neighbors” 相关考题
考题 Which BGP attribute is considered first as a tie-breaker in JUNOS software?() A. originB. weightC. as-path lengthD. local-preference

考题 Which three commands allow you to verify the current state of your BGP neighbors?() A. show bgp groupB. show bgp statusC. show bgp summaryD. show bgp neighborE. show protocols bgp

考题 Which of the following tools would allow an administrator to push out a software update to allswitches on the network?() A. Network managementB. Protocol analyzerC. Network monitoringD. System diagnostic

考题 Which three functions are provided by JUNOS Software for security platforms?()A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)

考题 IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

考题 Which three statements are true regarding IDP?()A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP inspects traffic up to the Application layer.C、IDP searches the data stream for specific attack patterns.D、IDP inspects traffic up to the Presentation layer.E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

考题 Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()A、MAC addressB、DNS serverC、DHCP serverD、resolve addressE、endpoint address

考题 Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?()A、TestKingB telnetB、TestKingB pingC、TestKingB traceD、TestKingB show ip routeE、TestKingB show interfaceF、TestKingB show cdp neighbors

考题 Which IOS features are used to avoid Routing loops when dynamic Routing protocols are used betweenPE and CE in MPLS-VPN networks?()A、Site Of Origin SOO.B、SHAM links with OSPFC、BGP cost communityD、BGP feature allow-as inE、RPF Reverse Path forwarding.F、Access-list Control in Distance Vector protocol like RIP and EIGRP.

考题 Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic

考题 Which BGP attribute is considered first as a tie-breaker in JUNOS software?()A、originB、weightC、as-path lengthD、local-preference

考题 Which BGP attribute is considered first as a tie-breaker in JUNOS software?()A、MEDB、originC、weightD、as-path lengthE、local-preference

考题 Which three JUNOS software features allow for increased security on your network?()A、firewall filtersB、data encryptionC、routing protocol authenticationD、support for BGP path mtu discoveryE、automatic discovery for IPSEC neighbors

考题 Which two statements are true regarding IDP?()A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.C、IDP inspects traffic up to the Presentation layer.D、IDP inspects traffic up to the Application layer.

考题 In JUNOS software, which three routing protocols can be used to route IPv6?()A、IS-ISB、StaticC、RIPv2D、OSPFv2E、MP-BGP

考题 Which three commands allow you to verify the current state of your BGP neighbors?()A、show bgp groupB、show bgp statusC、show bgp summaryD、show bgp neighborE、show protocols bgp

考题 Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()A、MPLS LSPB、ATM tunnelC、GRE tunnelD、IPSEC tunnelE、L2TPv3 session

考题 多选题Which three functions are provided by JUNOS Software for security platforms?()AVPN establishmentBstateful ARP lookupsCDynamic ARP inspectionDNetwork Address TranslationEinspection of packets at higher levels (Layer 4 and above)

考题 多选题Which three commands allow you to verify the current state of your BGP neighbors?()Ashow bgp groupBshow bgp statusCshow bgp summaryDshow bgp neighborEshow protocols bgp

考题 多选题Which three of the following network features are methods used to achieve high availability()ASpanning Tree Protocol(STP)BDelay reductionCHot Standby Routing Protocol(HSRP)DDynamic routing protocolsEQuality of Service(QoS)FJitter management

考题 单选题Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?()A TestKingB telnetB TestKingB pingC TestKingB traceD TestKingB show ip routeE TestKingB show interfaceF TestKingB show cdp neighbors

考题 多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.

考题 多选题In JUNOS software, which three routing protocols can be used to route IPv6?()AIS-ISBStaticCRIPv2DOSPFv2EMP-BGP

考题 多选题Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()AMAC addressBDNS serverCDHCP serverDresolve addressEendpoint address

考题 单选题Which statement accurately describes firewall user authentication?()A Firewall user authentication provides another layer of security in a network.B Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C Firewall user authentication enables session-based forwarding.D Firewall user authentication is used as a last resort security method in a network.

考题 多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

考题 多选题Which three statements are true regarding IDP?()AIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP inspects traffic up to the Application layer.CIDP searches the data stream for specific attack patterns.DIDP inspects traffic up to the Presentation layer.EIDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.