You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

题目

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()

  • A、ICMP
  • B、SNMP
  • C、TCP
  • D、HTTPS

相似考题
更多“You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS”相关问题
  • 第1题:

    You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?()

    A. TFTP

    B. FTP

    C. SCP

    D. SFTP


    参考答案:B, C

  • 第2题:

    Which two statements best describe Cisco IOS IP SLA?()

    • A、only implemented between Cisco source and destination-capable devices
    • B、statistics provided by syslog, CLI, and SNMP
    • C、measures delay, jitter, packet loss, and voice quality
    • D、only monitors VoIP traffic flows
    • E、provides active monitoring
    • F、provides passive monitoring

    正确答案:C,E

  • 第3题:

    The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()

    • A、 Business-critical traffic will be sorted into two QoS classes.
    • B、 Real-time traffic will be sorted into one QoS class.
    • C、 Voice traffic will be considered real-time traffic while call signaling will be considered business-critical.
    • D、 All traffic except real-time will be considered best-effort.
    • E、 Routing, management, and transactional traffic will be considered business-critical.
    • F、 Voice and call signaling traffic will be considered real-time.

    正确答案:E,F

  • 第4题:

    You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

    • A、access profile
    • B、IKE parameters
    • C、tunneled interface
    • D、redirect policy

    正确答案:A,B

  • 第5题:

    You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()

    • A、PPP
    • B、UDP
    • C、TCP
    • D、ICMP

    正确答案:A,C

  • 第6题:

    You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()

    • A、Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
    • B、Configure a security policy that references the unified-access-control captive-portal service.
    • C、Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
    • D、Configure a security policy that references the unified-access-control intranet-controller service.

    正确答案:B,C

  • 第7题:

    You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()

    • A、The endpoints can use agentless access.
    • B、Encrypted traffic flows between the endpoint and the enforcer.
    • C、Encrypted traffic flows between the endpoint and the protected resource
    • D、The endpoints can use the Odyssey Access Client.

    正确答案:B,D

  • 第8题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()

    • A、Check the application log on the Web server.
    • B、Use Network Monitor to capture network traffic on the Web server.
    • C、Review the log files created by IIS on the Web server.
    • D、Configure a performance log to capture all Web service counters. Review the performance log data.

    正确答案:C

  • 第9题:

    You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()

    • A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers
    • B、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
    • C、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
    • D、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

    正确答案:A

  • 第10题:

    多选题
    Which two of these are differences between traffic policing and traffic shaping?()
    A

    with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available again

    B

    with policing you can tune the buffer usage for traffic exceeding the specified CIR

    C

    with shaping you can tune the buffer usage for traffic exceeding the specified CIR

    D

    shaping should only be applied for ingress traffic,policing only for egress

    E

    policing uses a token bucket algorithm,shaping uses an SPD algorithm


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)
    A

    It is necessary to forward ARP requests to remote hosts.

    B

    It is necessary when translated traffic belongs to the same subnet as the ingress interface.

    C

    It is not automatic and you must configure it.

    D

    It is enabled by default and you do not need to configure it.


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()
    A

    Business-critical traffic will be sorted into two QoS classes.

    B

    Real-time traffic will be sorted into one QoS class.

    C

    Voice traffic will be considered real-time traffic while call signaling will be considered business-critical.

    D

    All traffic except real-time will be considered best-effort.

    E

    Routing, management, and transactional traffic will be considered business-critical.

    F

    Voice and call signaling traffic will be considered real-time.


    正确答案: A,E
    解析: 暂无解析

  • 第13题:

    Which two of these are differences between traffic policing and traffic shaping?()

    • A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available again
    • B、with policing you can tune the buffer usage for traffic exceeding the specified CIR
    • C、with shaping you can tune the buffer usage for traffic exceeding the specified CIR
    • D、shaping should only be applied for ingress traffic,policing only for egress
    • E、policing uses a token bucket algorithm,shaping uses an SPD algorithm

    正确答案:A,C

  • 第14题:

    HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network. Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)

    • A、a shared single interface
    • B、the ability to track serial interfaces
    • C、UDP-based hello packets
    • D、the impact of flapping links if timers are too low

    正确答案:B,D

  • 第15题:

    An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()

    • A、Hub
    • B、Bridge
    • C、Switch
    • D、Router

    正确答案:C

  • 第16题:

    You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()

    • A、You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
    • B、No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
    • C、You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
    • D、You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

    正确答案:A

  • 第17题:

    You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?()

    • A、TFTP
    • B、FTP
    • C、SCP
    • D、SFTP

    正确答案:B,C

  • 第18题:

    In JUNOS software, which two are methods of restricting multicast traffic beyond your domain? ()

    • A、MSDP
    • B、Routing policy
    • C、Administrative scoping
    • D、Bootstrap export policy

    正确答案:B,C

  • 第19题:

    You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()

    • A、VPN Traffic
    • B、DNS Traffic
    • C、LDAP Traffic
    • D、HTTP Traffic
    • E、HTTPS Traffic
    • F、Traffic from the network address of 192.168.10/24

    正确答案:A,C,D,E

  • 第20题:

    You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()

    • A、Configure a WMI event trigger.
    • B、Configure a Network Monitor capture filter.
    • C、Configure a Network Monitor trigger.
    • D、Configure a System Monitor alert.

    正确答案:C

  • 第21题:

    You are designing a strategy for migrating to the new environment.  Which two factions from your current environment will affect your migration strategy?()

    • A、 Trusts between domains
    • B、 Number of BDC s in each domain
    • C、 Users and resources in each domain
    • D、 Current hardware for domain controllers
    • E、 Current amount of replication traffic over WAN links

    正确答案:A,C

  • 第22题:

    多选题
    You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()
    A

    PPP

    B

    UDP

    C

    TCP

    D

    ICMP


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()
    A

    ICMP

    B

    SNMP

    C

    TCP

    D

    HTTPS


    正确答案: A,D
    解析: 暂无解析