网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two are uses of NAT?()
A

enabling network migrations

B

conserving public IP addresses

C

allowing stateful packet inspection

D

preventing unauthorized connections from outside the network


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two are uses of NAT?()Aenabling network migrationsBconserving public IP addressesCallowing stateful packet inspectionDpreventing unauthorized connections from outside the network” 相关考题
考题 Which two statements about static NAT are true? ()(Choose two.) A. Static NAT can only be used with destination NAT.B. Static NAT rules take precedence over overlapping dynamic NAT rules.C. NAT rules take precedence over overlapping static NAT rules.D. A reverse mapping is automatically created.

考题 Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.) A. LDP uses Down Stream On Demand.B. RSVP uses Down Stream On Demand.C. LDP uses Down Stream Unsolicited.D. RSVP uses Down Stream Unsolicited.

考题 Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?() A.NASB.FirewallC.HubD.Bridge

考题 Which two statements about static NAT are true? ()(Choose two.)A、Static NAT can only be used with destination NAT.B、Static NAT rules take precedence over overlapping dynamic NAT rules.C、NAT rules take precedence over overlapping static NAT rules.D、A reverse mapping is automatically created.

考题 Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext

考题 Which two statements about static NAT translations are true?()A、They are always present in the NAT table.B、They allow connection to be initiated from the outside.C、They can be configured with access lists, to allow two or more connections to be initiated from the outside.D、They require no inside or outside interface markings because addresses are statically defined.

考题 Which two statements correctly identify factors to consider when Configuring WAN QoS?()A、Voice Traffic uses Assured ForwardingB、Voice Signaling traffic uses Assured ForwardingC、Voice Signaling traffic uses priority queuingD、Voice Traffic uses priority queuingE、Voice signaling traffic should use priority queuing with Assured Forwarding

考题 Which two statements about OSPF IPv6 routing are true?()A、It requires OSPF version 3.B、automatically detects neighbors over NHMA interfacesC、It supports encryption usingD、It uses LSA type 9E、It uses LSA type 8

考题 Which of the following describes a static NAT?()A、A static NAT uses a one to many mapping.B、A static NAT uses a many to one mapping.C、A static NAT uses a many to many mapping.D、A static NAT uses a one to one mapping.

考题 Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?()A、NASB、FirewallC、HubD、Bridge

考题 Which two statements about static NAT are true?()A、Static NAT can only be used with destination NAT.B、Static NAT rules take precedence over overlapping dynamic NAT rules.C、Dynamic NAT rules take precedence over overlapping static NAT rules.D、A reverse mapping is automatically created.

考题 Which two statements are true about pool-based source NAT? ()(Choose two.)A、PAT is not supported.B、PAT is enabled by default.C、It supports the address-persistent configuration option.D、It supports the junos-global configuration option.

考题 Which two statements are true about encrypting RMAN backup?() (Choose two.)A、The transparent encryption of backups uses the encryption walletB、The database uses the same encryption key for every encrypted backupC、The password encryption of backups only uses the password while creating and restoring backupD、If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext

考题 单选题Which of the following describes a static NAT?()A A static NAT uses a one to many mapping.B A static NAT uses a many to one mapping.C A static NAT uses a many to many mapping.D A static NAT uses a one to one mapping.

考题 多选题You are creating a destination NAT rule-set. Which two are valid for use with the from clause?()Asecurity policyBinterfaceCrouting-instanceDIP address

考题 多选题Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()AVPLS uses LDP for signaling.BVPLS uses BGP for autodiscovery and signaling.CVPLS uses extended IS-IS for signalingDVPLS uses OSPF version 3 for auto discovery and signalingEVPLS uses spanning tree for signaling

考题 多选题You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()APPPBUDPCTCPDICMP

考题 多选题Which two are uses of NAT?()Aenabling network migrationsBconserving public IP addressesCallowing stateful packet inspectionDpreventing unauthorized connections from outside the network

考题 多选题Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)ALDP uses Down Stream On Demand.BRSVP uses Down Stream On Demand.CLDP uses Down Stream Unsolicited.DRSVP uses Down Stream Unsolicited.

考题 多选题Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)AAddresses used for NAT pools should never overlap.BIf more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.CIf traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.DDynamic source NAT rules take precedence over static source NAT rules.

考题 多选题Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()AJUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.BJUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.CJUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.DJUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

考题 多选题What are two uses of NAT?()Aconserving public IP addressesBallowing stateful packet inspectionCpreventing unauthorized connections from outside the networkDallowing networks with overlapping private address space to communicate

考题 多选题Which two statements are true about encrypting RMAN backup?() (Choose two.)AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 多选题Which two statements about static NAT are true? ()(Choose two.)AStatic NAT can only be used with destination NAT.BStatic NAT rules take precedence over overlapping dynamic NAT rules.CNAT rules take precedence over overlapping static NAT rules.DA reverse mapping is automatically created.

考题 多选题Which two statements about static NAT translations are true?()AThey are always present in the NAT table.BThey allow connection to be initiated from the outside.CThey can be configured with access lists, to allow two or more connections to be initiated from the outside.DThey require no inside or outside interface markings because addresses are statically defined.

考题 多选题Which two statements correctly identify factors to consider when Configuring WAN QoS?()AVoice Traffic uses Assured ForwardingBVoice Signaling traffic uses Assured ForwardingCVoice Signaling traffic uses priority queuingDVoice Traffic uses priority queuingEVoice signaling traffic should use priority queuing with Assured Forwarding

考题 多选题Which two statements about static NAT are true?()AStatic NAT can only be used with destination NAT.BStatic NAT rules take precedence over overlapping dynamic NAT rules.CDynamic NAT rules take precedence over overlapping static NAT rules.DA reverse mapping is automatically created.