当前分类: JN0-130
问题:单选题Click the Exhibit button. Referring to the exhibit, which statement contains the correct gateway parameters?()A [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20...
查看答案
问题:多选题The Origin attribute describes the source of the BGP prefix. Which three are valid Origin codes?() (Choose three.)AIGPBBGPCEGPDIncompleteEAnonymous...
问题:多选题Which three BGP states follow the successful completion of the underlying TCP connectivity? ()(Choose three.)AIdleBConnectCOpen SentDEstablishedEOpen Confirm...
问题:单选题During OSPF adjacency formation, what state is a router in when it is sending LSA header information to its neighbor? ()A InitB 2WayC ExStartD Exchange...
问题:单选题What is one function of MBGP?()A extending IPSec tunnelsB carrying multiple address familiesC propagating DVMRP routing informationD extending Autonomous System GRE tunnels...
问题:单选题Which type of VPN router is not required to run MPLS?()A Provider Core (P)B Provider Edge (PE)C Customer Edge (CE)D Customer Boundary (CB)...
问题:单选题Which configuration command is used to make the ERX Edge Router an NTP server?()A set ntp-serverB set ntp serverC ntp-server enableD ntp server enable...
问题:单选题Two Level 1 routers are exchanging Hello packets with different Area IDs.What occurs between these routers?()A An Adjacency is formed.B No IS-IS PDUs are sentC An Adjacency does not form.D An Adjacency forms but traffic is not forwarded....
问题:多选题Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)AMIME patternBfile extensionCIP spoofingDPOP3Eprotocol command...
问题:多选题Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)ATraffic is permitted from the trust zone to the untrust zone.BIntrazone traffic in the trust zone is permitted.CAll traff...
问题:多选题Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)AIn the DH key exchange process, the session key is never passed across the network.BIn the DH key exchange process, the public and private keys are mat...
问题:多选题Which three functions are provided by the Junos OS for security platforms?()(Choose three.)AVPN establishmentBstateful ARP lookupsCDynamic ARP inspectionDNetwork Address TranslationEinspection of packets at higher levels (Layer 4 and above)...
问题:单选题In a Bridged 1483 network, which set of commands is used to configure an ATM sub-interface?()A interface atm 6/0.33 atm pvc 33 0 33 aal5snap ip description Company-XYZ encapsulation bridge1483 ip address unnumbered loopback0B interface atm 6/0.33 atm p...
问题:单选题The same Web site is visited for the second time using a branch SRX Series Services Gateway configured with SurfControl integrated Web filtering.Which statement is true?()A The SRX device sends the URL to the SurfControl server in the cloud and the Sur...
问题:多选题Which three statements are correct regarding the CLI command, 12tp destination profile to-NewYork virtual-router vr1 ip address 1.1.1.1 ? ()(Choose three.)ALNS IP address is defined.BLAC IP address is defined.CVirtual-router vr1 sends and receives L2TP...
问题:多选题Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)Arate limiting of ICMPBRADIUS authorizationsCsource address validationDstateful firewall on the router...
问题:单选题Which command is used to display a address pool for a DHCP Local Server?()A show ip local poolB show ip dhcp local poolC show ip dhcp-local poolD show ip pool...
问题:多选题What are two advantages to customers with L2 MPLS VPNs? ()(Choose two.)AService provider has routing control.BCustomers control their own routing.CCan communicate protocols other than IP.DAllows them to use separate networks for IP and VPN traffic....