This section is where you define all chassis clustering configuration.
This configuration is required for members of a chassis cluster to talk to each other.
You can apply this configuration in the chassis cluster to make configuration easier.
This section is where unique node configuration is applied.
第1题:
A. [edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }
B. [edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }
C. [edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }
D. [edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }
第2题:
A router has been configured with the settings shown below: [edit] user@host# show system authentication-order authentication-order [ radius tacplus ]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()
第3题:
Which command do you use to display the messages seen during the last system boot?()
第4题:
If both nodes in a chassis cluster initialize at different times, which configuration example will allow you to ensure that the node with the higher priority will become primary for your RGs other than RG0?()
第5题:
查看IHUB 内存的命令
第6题:
A system administrator wants to configure a system so that all new users will be put into the database group by default. How would this be accomplished?()
第7题:
Three physical interfaces are redundant.
You must define an additional redundancy group.
node 0 will immediately become primary for redundancy group 1.
You must issue an operational command and reboot the system for the above configuration to take effect.
第8题:
This section is where you define all chassis clustering configuration.
This configuration is required for members of a chassis cluster to talk to each other.
You can apply this configuration in the chassis cluster to make configuration easier.
This section is where unique node configuration is applied.
第9题:
The user lab will not be able to login.
The user lab will be authenticated against the local database and will be able to login.
The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.
The user will be able to login only if tries to login as the root user.
第10题:
user@router# show system services
user@router> show configuration services
user@router# show configuration system services
user@router# show system login
第11题:
[edit protocols bgp group external] user@router# set interfaces ge-0/0/0.42
[edit protocols bgp group external] user@router# edit show interfaces ge-0/0/0.42
[edit protocols bgp group external] user@router# top show interfaces ge-0/0/0.42
[edit protocols bgp group external] user@router# show interfaces ge-0/0/0.42
第12题:
static destination NAT
static source NAT
pool-based destination NAT without PAT
pool-based destination NAT with PAT
第13题:
A. show system boot-messages
B. show chassis messages
C. show file system boot-messages
D. show boot-log messages
第14题:
You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?()
第15题:
SR7750查看系统已经打开的端口命令是()
第16题:
Which CLI command allows you to determine how many licenses are currently used on the routerand are further needed by the router?()
第17题:
查看ihub内存的命令()
第18题:
interface-based source NAT
static source NAT
pool-based source NAT with PAT
pool-based source NAT without PAT
第19题:
[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }
[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }
[edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }
[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }
第20题:
[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
第21题:
[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } scheduler-name now; } } }
[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }
[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn scheduler-name now; } } } }
[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; scheduler-name now; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }myTunnel;
第22题:
[edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }
第23题:
The user lab will not be able to login.
The user lab will be authenticated against the local database and will be able to login.
The user will be able to login only if tries to login as the root user.
The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.