更多“What are two ways to view the system log files on a WX device? ()(Choose two.)A、Use the CLI and enter show log.B、Use the CLI and enter show all.C、Use the CLI and enter show logging.D、In WebView, choose Admin Tools Display System Log.”相关问题
  • 第1题:

    What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)

    A. Admin > Device

    B. Device Setup > Topology

    C. Compression > Endpoints

    D. Device Setup > Advanced > Topology


    参考答案:C, D

  • 第2题:

    What are two ways to view the system log files on a WX device? ()(Choose two.)

    A. Use the CLI and enter show log.

    B. Use the CLI and enter show all.

    C. Use the CLI and enter show logging.

    D. In WebView, choose Admin > Tools > Display System Log.


    参考答案:A, D

  • 第3题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    • A、Allow unrestricted access to the console or VTY ports
    • B、Use a firewall to restrict access from the outside to the network devices
    • C、Always use Telnet to access the device command line because its data is automatically encrypted
    • D、Use SSH or another encrypted and authenticated transport to access device configurations
    • E、Prevent the loss of passwords by disabling password encryption

    正确答案:B,D

  • 第4题:

    Which two commands would you use to view OSPF routes?()

    • A、show ip route ospf
    • B、show ospf routes
    • C、show route protocol ospf
    • D、show route

    正确答案:C,D

  • 第5题:

    What command would you use to view an IS-IS adjacency?()

    • A、show iso neighbor
    • B、show isis neighbor
    • C、show iso adjacency
    • D、show isis adjacency

    正确答案:D

  • 第6题:

    Which command do you use to show active alarms?()

    • A、show hardware state
    • B、show system alarms
    • C、show chassis state
    • D、show services alarms

    正确答案:B

  • 第7题:

    Company.com is running a p5-550 system with inactive processors. The system is managed using the Integrated Virtualization Manager. How would the system administrator activate two additional processors?()

    • A、Use the Advanced Systems Management Interface to enter the Capacity on Demand Enablement code.
    • B、Use the Web-based System Manager Interface to enter the Capacity on Demand enablement code.
    • C、Use smitty or smit interface to enter the Capacity on Demand enablement code.
    • D、Use oem_setup_env on the Virtual I/O Server to enter the Capacity on Demand enablement code.

    正确答案:A

  • 第8题:

    When troubleshooting a possible misconfiguration between the LAC and LNS, what are two tools used to compare them?() (Choose two.)

    • A、show aaa-domain map on the LAC
    • B、show aaa-domain map on the LNS
    • C、show l2tp destination profile on the LAC
    • D、show l2tp destination profile on the LNS

    正确答案:A,D

  • 第9题:

    Which command do you use to display the messages seen during the last system boot?()

    • A、show system boot-messages
    • B、show chassis messages
    • C、show file system boot-messages
    • D、show boot-log messages

    正确答案:A

  • 第10题:

    Which CLI command do you use to determine which files are cleanup candidates?()

    • A、request system storage cleanup candidates
    • B、request system services storage candidates
    • C、request system services candidate cleanup
    • D、request system storage cleanup dry-run

    正确答案:D

  • 第11题:

    多选题
    What are two ways to view the system log files on a WX device? ()(Choose two.)
    A

    Use the CLI and enter show log.

    B

    Use the CLI and enter show all.

    C

    Use the CLI and enter show logging.

    D

    In WebView, choose Admin > Tools > Display System Log.


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    What are three ways to collect the diagnostics files when working with Juniper Networks Technical Assistance Center? ()(Choose three.)
    A

    Run the diag.exe CLI command.

    B

    In WebView, go to Monitor > Traffic > Export.

    C

    In WebView, go to Admin > Tools > Export Data.

    D

    In WebView, to to Monitor > Export > Export Logs.

    E

    In WebView, go to Admin > Tools > Diagnostic File.


    正确答案: C,B
    解析: 暂无解析

  • 第13题:

    What are three ways to collect the diagnostics files when working with Juniper Networks Technical Assistance Center? ()(Choose three.)

    A. Run the diag.exe CLI command.

    B. In WebView, go to Monitor > Traffic > Export.

    C. In WebView, go to Admin > Tools > Export Data.

    D. In WebView, to to Monitor > Export > Export Logs.

    E. In WebView, go to Admin > Tools > Diagnostic File.


    参考答案:B, C, E

  • 第14题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    A.Allow unrestricted access to the console or VTY ports

    B.Use a firewall to restrict access from the outside to the network devices

    C.Always use Telnet to access the device command line because its data is automatically encrypted

    D.Use SSH or another encrypted and authenticated transport to access device configurations

    E.Prevent the loss of passwords by disabling password encryption


    参考答案:B, D

  • 第15题:

    What are three ways to collect the diagnostics files when working with Juniper Networks Technical Assistance Center? ()(Choose three.)

    • A、Run the diag.exe CLI command.
    • B、In WebView, go to Monitor > Traffic > Export.
    • C、In WebView, go to Admin > Tools > Export Data.
    • D、In WebView, to to Monitor > Export > Export Logs.
    • E、In WebView, go to Admin > Tools > Diagnostic File.

    正确答案:B,C,E

  • 第16题:

    With the following CLI command output performed on an LNS: show l2tp session L2TP session 1/to-Denver/2 is up Which two statements are correct? ()(Choose two.)

    • A、This command was done on the LNS
    • B、This command was done on the LAC
    • C、The 1 defines the destination number
    • D、The 1 defines the session number

    正确答案:B,C

  • 第17题:

    Which CLI command allows you to determine how many licenses are currently used on the routerand are further needed by the router?()

    • A、show system license key
    • B、show system license usage
    • C、show system license total
    • D、show system license profile

    正确答案:B

  • 第18题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第19题:

    What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)

    • A、Admin > Device
    • B、Device Setup > Topology
    • C、Compression > Endpoints
    • D、Device Setup > Advanced > Topology

    正确答案:C,D

  • 第20题:

    Which two functions require the use of the CLI?() (Choose two.)

    • A、adding a VLAN
    • B、adding a cluster
    • C、running a tcpdump
    • D、adding a target server

    正确答案:A,C

  • 第21题:

    You want to log into the router and make a configuration change.After loggin in as the root user, what is the next command you must enter?()

    • A、enable
    • B、configure
    • C、edit
    • D、cli

    正确答案:D

  • 第22题:

    Which command do you use to show active alarms?()

    • A、show hadrware alarms
    • B、show system alarms
    • C、show chassis state
    • D、file list alarm

    正确答案:B

  • 第23题:

    多选题
    With the following CLI command output performed on an LNS: show l2tp session L2TP session 1/to-Denver/2 is up Which two statements are correct? ()(Choose two.)
    A

    This command was done on the LNS

    B

    This command was done on the LAC

    C

    The 1 defines the destination number

    D

    The 1 defines the session number


    正确答案: A,B
    解析: 暂无解析