Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)A、Addresses used for NAT pools should never overlap.B、If more than one rule-set matches traffic, the rule-set with the most sp

题目

Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)

  • A、Addresses used for NAT pools should never overlap.
  • B、If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.
  • C、If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.
  • D、Dynamic source NAT rules take precedence over static source NAT rules.

相似考题
更多“Which two statements in a source”相关问题
  • 第1题:

    Which two statements are correct when you use the reject parameter as the next-hop value for a static route?()

    • A、The packet is dropped and the packet's source is marked with the no-readvertise parameter.
    • B、The system sends the packet back to the source.
    • C、The packet is dropped from the network.
    • D、The system sends an ICMP message back to the source of the packet.

    正确答案:C,D

  • 第2题:

    Which two statements are true when source/destination filters are enabled? ()(Choose two.)

    • A、Excluded traffic is not accelerated.
    • B、Excluded traffic is only compressed.
    • C、Source/destination filter applies to all traffic sent from LAN to WAN.
    • D、Source/destination filters work in packet interception mode using RIPv2.

    正确答案:A,C

  • 第3题:

    In order to configure two routers as anycast RPs,which of these requirements,at a minimum, must be satisfied?()

    • A、Multicast Source Discovery Protocol mesh-groups must be configured between the two anycast RPs.
    • B、The RPs must be within the same IGP domain.
    • C、Multicast Source Discovery Protocol must be configured between the two anycast RPs.
    • D、The two anycast RPs must be IBGP peers.

    正确答案:C

  • 第4题:

    Which two statements are true about pool-based source NAT? ()(Choose two.)

    • A、PAT is not supported.
    • B、PAT is enabled by default.
    • C、It supports the address-persistent configuration option.
    • D、It supports the junos-global configuration option.

    正确答案:B,C

  • 第5题:

    Which is the source used by Automatic SQL Tuning that runs as part of the AUTOTASK framework?()

    • A、 SQL statements that are part of the AWR baseline only
    • B、 SQL statements based on the AWR top SQL identification
    • C、 SQL statements that are part of the available SQL Tuning Set (STS) only
    • D、 SQL statements that are available in the cursor cache and executed by a user other than SYS

    正确答案:B

  • 第6题:

    多选题
    Which two statements are correct about database transportation?() (Choose two.)
    A

    The source and target platforms must be the same

    B

    Redo logs, control files and temp files are also transported

    C

    The transported database must have the same database identifier (DBID) as the source database and cannot be changed

    D

    The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported

    E

    Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format


    正确答案: A,D
    解析: 暂无解析

  • 第7题:

    多选题
    Which two statements are correct about database transportation? ()
    A

    The source and target platforms must be the same

    B

    Redo logs, control files and temp files are also transported

    C

    The transported database must have the same database identifier (DBID) as the source database and cannot be changed

    D

    The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported

    E

    Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format


    正确答案: A,E
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements are reserved words in Java?()
    A

    Run

    B

    Import

    C

    Default

    D

    Implement


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true when source/destination filters are enabled? ()(Choose two.)
    A

    Excluded traffic is not accelerated.

    B

    Excluded traffic is only compressed.

    C

    Source/destination filter applies to all traffic sent from LAN to WAN.

    D

    Source/destination filters work in packet interception mode using RIPv2.


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true about the forwarding table?()
    A

    The forwarding table lists each source protocol and preference for each destination.

    B

    The forwarding table contains only active routes.

    C

    The forwarding table is used to process transit packets.

    D

    The forwarding table is stored in compact flash.


    正确答案: A,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about the forwarding table?()
    A

    The forwarding table lists each source protocol and preference for each destination

    B

    The forwarding table constains only active routes

    C

    The forwarding table is used to process transit packets

    D

    The forwarding table is stored in compact flash


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true about pool-based source NAT? ()(Choose two.)
    A

    PAT is not supported.

    B

    PAT is enabled by default.

    C

    It supports the address-persistent configuration option.

    D

    It supports the junos-global configuration option.


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    Which two statements are correct about database transportation?() 

    • A、 The source and target platforms must be the same
    • B、 Redo logs,control files and temp files are also transported
    • C、 The transported database must have the same database identifier (DBID) as the source database and cannot be changed
    • D、 The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
    • E、 Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format

    正确答案:D,E

  • 第14题:

    Which two statements about RPF checks in Multicast Source Discovery Protocol (MSDP) are true?()

    • A、It prevents message looping, Session Advertisement (SA)messages must be RPF checked
    • B、RPF check should be done against the route to the source S of the corresponding PIM-SM domain
    • C、RPF check should be done against the route to the Rendez-vous Point of the corresponding PIM-SM domain,which originated the SA
    • D、RPF checking Session Advertisement (SA) messages will cause message looping

    正确答案:A,C

  • 第15题:

    Which two statements are true about the forwarding table?()

    • A、The forwarding table lists each source protocol and preference for each destination
    • B、The forwarding table constains only active routes
    • C、The forwarding table is used to process transit packets
    • D、The forwarding table is stored in compact flash

    正确答案:B,C

  • 第16题:

    Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)

    • A、rate limiting of ICMP
    • B、RADIUS authorizations
    • C、source address validation
    • D、stateful firewall on the router

    正确答案:A,C

  • 第17题:

    多选题
    Which two statements are correct when you use the reject parameter as the next-hop value for a static route?()
    A

    The packet is dropped and the packet's source is marked with the no-readvertise parameter.

    B

    The system sends the packet back to the source.

    C

    The packet is dropped from the network.

    D

    The system sends an ICMP message back to the source of the packet.


    正确答案: A,B
    解析: 暂无解析

  • 第18题:

    多选题
    Which two statements are true about L2TP tunnels?() (Choose two.)
    A

    Traffic is clear text

    B

    Traffic is encrypted 

    C

    They are initiated by the LNS

    D

    They are initiated by the LAC


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    多选题
    Which two locations can be configured as a source for the IOS image in the boot system command?()
    A

    RAM

    B

    NVRAM

    C

    flash memory

    D

    HTTP server

    E

    TFTP server

    F

    Telnet server


    正确答案: B,F
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)
    A

    Addresses used for NAT pools should never overlap.

    B

    If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.

    C

    If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.

    D

    Dynamic source NAT rules take precedence over static source NAT rules.


    正确答案: D,A
    解析: 暂无解析

  • 第21题:

    单选题
    Which is the source used by Automatic SQL Tuning that runs as part of the AUTOTASK framework?()
    A

     SQL statements that are part of the AWR baseline only

    B

     SQL statements based on the AWR top SQL identification

    C

     SQL statements that are part of the available SQL Tuning Set (STS) only

    D

     SQL statements that are available in the cursor cache and executed by a user other than SYS


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true about the forwarding table?()
    A

    The forwarding table lists each source protocol and preference for each destination.

    B

    The forwarding table contains only active routes.

    C

    The forwarding table is used to process transit packets.

    D

    The forwarding table is stored in compact flash


    正确答案: D,A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements best describe Cisco IOS IP SLA?()
    A

    only implemented between Cisco source and destination-capable devices

    B

    statistics provided by syslog, CLI, and SNMP

    C

    measures delay, jitter, packet loss, and voice quality

    D

    only monitors VoIP traffic flows

    E

    provides active monitoring

    F

    provides passive monitoring


    正确答案: E,A
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements about an IDS are true?()
    A

    The IDS is in the traffic path.

    B

    The IDS can send TCP resets to the source device.

    C

    The IDS can send TCP resets to the destination device.

    D

    The IDS listens promiscuously to all traffic on the network.

    E

    Default operation is for the IDS to discard malicious traffic.


    正确答案: E,D
    解析: 暂无解析