In JUNOS software, what is the default interface metric for IS-IS?()
第1题:
A.1
B.10
C.100
D.10^8/link bandwidth
第2题:
What are three examples of a provider-provisioned VPN supported by JUNOS software?()
第3题:
Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()
第4题:
Which two statements about JUNOS Software packet handling are correct?()
第5题:
MED
origin
preference
local preference
第6题:
1 second
3 seconds
9 seconds
12 seconds
第7题:
Each process has its own protected memory space
Each process is started manually by the user at boot
All processes are dependent on each other
Multiple processes allow each routing protocol to be independent
第8题:
Linux kernel
routing protocol daemon
session-based forwarding module
separate routing and security planes
第9题:
a set of chassis clusters that fail over as a group
a set of devices that participate in a chassis cluster
a set of VRRP neighbors that fail over as a group
a set of chassis cluster objects that fail over as a group
第10题:
Apply an export policy in RIP
Apply an import policy in RIP
Apply an export policy in OSPF
Apply an import policy in OSPF
第11题:
L2F
PPTP
Circuit cross-connect
Draft-Martini-based VPNs
Draft-Kompella-based VPNs
第12题:
What are three applications for firewall filters in JUNOS software?()
第13题:
What are two characteristics of the RED algorithm as implemented in JUNOS software?()
第14题:
In JUNOS software, what is the purpose of the eui-64 command?()
第15题:
What is the highest (strongest) priority that can be set on an LSP in JUNOS software?()
第16题:
request system software replace
request system software install
request system software add
request system software upgrade
第17题:
1
10
100
10^8/link bandwidth
第18题:
0
7
64
255
第19题:
wait
hold
passive
authenticate
第20题:
Linux kernel
routing protocol daemon
session-based forwarding module
separate routing and security planes
第21题:
route filtering
protect the routing engine
securing the router control plane
protect against hidden bridge loops
protect against denial of service attacks