网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which three ports does a WX device use for control traffic purposes?() (Choose three.)
A

3577 UDP

B

3578 UDP

C

3678 UDP

D

3577 TCP

E

3578 TCP


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which three ports does a WX device use for control traffic purposes?() (Choose three.)A3577 UDPB3578 UDPC3678 UDPD3577 TCPE3578 TCP” 相关考题
考题 On which three traffic types does firewall pass-through authentication work? ()(Choose three.) A. pingB. FTPC. TelnetD. HTTPE. HTTPS

考题 Which three RIP features are supported on the WX or WXC device? ()(Choose three.) A. SHA-1B. MD5 authenticationC. version 1 messagesD. version 2 messagesE. plain-text authentication

考题 Which three ports does a WX device use for control traffic purposes?() (Choose three.) A. 3577 UDPB. 3578 UDPC. 3678 UDPD. 3577 TCPE. 3578 TCP

考题 Which type of lock must be granted for the WX device to perform write acceleration on CIFS traffic?() A. oplockB. block lockC. bit range lockD. byte range lock

考题 Which database does WX Central Management System (WX CMS) software use to store historical data?() A. OracleB. MySQLC. SybaseD. Microsoft Access

考题 Which two conditions will cause switch-to-wire to occur? ()(Choose two.) A. loss of powerB. QoS congestionC. software failure occuredD. WX device exceeded its license speedE. traffic does not match application definiton

考题 Which three methods can you use for route discovery on a WX platform? ()(Choose three.) A. Enable RIPB. Enable OSPFC. Periodically poll any routerD. Import routes from a TFTP server

考题 Which three QoS mechanisms can be configured to improve VoIP quality on a converged  network?()A、The use of a queuing method that will give VoIP traffic strict priority over other traffic  B、The use of RTP header compression for the VoIP traffic.C、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED for the VoIP traffic

考题 Which three statistics does the Executive report summarize?() (Choose three.)A、latency and lossB、compression resultsC、traffic (by application)D、CRC and alignment errorsE、user access (by username)

考题 On which three traffic types does firewall pass-through authentication work? ()(Choose three.)A、pingB、FTPC、TelnetD、HTTPE、HTTPS

考题 Which three ports does a WX device use for control traffic purposes?() (Choose three.)A、3577 UDPB、3578 UDPC、3678 UDPD、3577 TCPE、3578 TCP

考题 Which of the following ports does RDP use by default?()A、23B、902C、1677D、3389

考题 Which two conditions will cause switch-to-wire to occur? ()(Choose two.)A、loss of powerB、QoS congestionC、software failure occuredD、WX device exceeded its license speedE、traffic does not match application definiton

考题 Which three RIP features are supported on the WX or WXC device? ()(Choose three.)A、SHA-1B、MD5 authenticationC、version 1 messagesD、version 2 messagesE、plain-text authentication

考题 Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)A、Fast Connection SetupB、TCP Acceleration (AFP)C、Network Sequence CachingD、AppFlow's MAPI accelerationE、Molecular Sequence Reduction

考题 Which three components does the Scheduler use for managing tasks within the Oracle environment? ()(Choose three.)A、a jobB、a programC、a scheduleD、a PL/SQL procedure

考题 多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS

考题 多选题Which three RIP features are supported on the WX or WXC device? ()(Choose three.)ASHA-1BMD5 authenticationCversion 1 messagesDversion 2 messagesEplain-text authentication

考题 多选题Which three methods can you use for route discovery on a WX platform? ()(Choose three.)AEnable RIPBEnable OSPFCPeriodically poll any routerDImport routes from a TFTP server

考题 单选题Which database does WX Central Management System (WX CMS) software use to store historical data?()A OracleB MySQLC SybaseD Microsoft Access

考题 多选题Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)AFast Connection SetupBTCP Acceleration (AFP)CNetwork Sequence CachingDAppFlow's MAPI accelerationEMolecular Sequence Reduction

考题 多选题Which two statements are correct about firewall filters in the Junos OS?()AFirewall filters are stateless.BFirewall filters are used to control routing information that is exchanged between devices.CFirewall filters are used to control traffic passing through the device.DFirewall filters can only be applied to traffic entering the device.

考题 单选题Which of the following ports does RDP use by default?()A 23B 902C 1677D 3389

考题 单选题Which type of lock must be granted for the WX device to perform write acceleration on CIFS traffic?()A oplockB block lockC bit range lockD byte range lock

考题 多选题Which three benefits does WX Central Management System (WX CMS) software offer WX administrators?()(Choose three.)ASupports up to 1500 WX devices.BSimplifies software deployment of WX devices.CProvides a scheduler for device management tasks.DSupport is offered for both UNIX- and Windows-based products.EProvides views of the immediate status of deployed devices and the service tunnels.

考题 单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD All traffic is flooded out all ports and an attacker is able to capture all dataE None of the other alternatives apply

考题 单选题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.