参考答案和解析
正确答案: B,C
解析: 暂无解析
更多“多选题What are three valid LDP message types? ()(Choose three.)Apeer discoveryBlabel distributionCpath initializationDsession managementEconnection establishment”相关问题
  • 第1题:

    Which three message types are valid PIMv2 message types?()

    • A、Register
    • B、Register-Stop
    • C、Join/Prune
    • D、Reject
    • E、Register-Prune
    • F、Register-Join

    正确答案:A,B,C

  • 第2题:

    What are three valid LDP message types? ()(Choose three.)

    • A、peer discovery
    • B、label distribution
    • C、path initialization
    • D、session management
    • E、connection establishment

    正确答案:A,B,D

  • 第3题:

    The Origin attribute describes the source of the BGP prefix. Which three are valid Origin codes?() (Choose three.)

    • A、IGP
    • B、BGP
    • C、EGP
    • D、Incomplete
    • E、Anonymous

    正确答案:A,C,D

  • 第4题:

    多选题
    Which of the following are types of flow control (Choose three.)()。
    A

    buffering

    B

    cut-through

    C

    windowing

    D

    congestion avoidance

    E

    load balancing


    正确答案: B,E
    解析: 暂无解析

  • 第5题:

    多选题
    Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN (Choose three.)()。
    A

    HDLC

    B

    Ethernet

    C

    Token Ring

    D

    PPP

    E

    FDDI

    F

    Frame Relay


    正确答案: E,A
    解析: 暂无解析

  • 第6题:

    多选题
    Which three types of content filtering are supported only for HTTP? ()(Choose three.)
    A

    block Flash

    B

    block Java applets

    C

    block ActiveX

    D

    block EXE files

    E

    block MIME type


    正确答案: E,A
    解析: 暂无解析

  • 第7题:

    多选题
    Which are valid modes for a switch port used as a VLAN trunk (Choose three.)()。
    A

    transparent

    B

    auto

    C

    on

    D

    desirable

    E

    blocking

    F

    forwarding


    正确答案: A,D
    解析: 暂无解析

  • 第8题:

    多选题
    The Origin attribute describes the source of the BGP prefix. Which three are valid Origin codes?() (Choose three.)
    A

    IGP

    B

    BGP

    C

    EGP

    D

    Incomplete

    E

    Anonymous


    正确答案: D,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which three of the following are components of a syslog message? ()(Choose three.)
    A

    time stamp

    B

    error codes

    C

    severity level

    D

    log message name


    正确答案: D,B
    解析: 暂无解析

  • 第10题:

    多选题
    What are three components of the NET address? ()(Choose three.)
    A

    Area ID

    B

    N-selector

    C

    System ID

    D

    ISO number

    E

    MAC address


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    多选题
    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()
    A

    FTP

    B

    Telnet

    C

    SMTP

    D

    DNS

    E

    HTTP

    F

    POP3


    正确答案: B,E
    解析: 暂无解析

  • 第12题:

    多选题
    What are three valid Juniper Networks IPS attack object types?() (Choose three.)
    A

    signature

    B

    anomaly

    C

    trojan

    D

    virus

    E

    chain


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    Which three of the following are components of a syslog message? ()(Choose three.)

    • A、time stamp
    • B、error codes
    • C、severity level
    • D、log message name

    正确答案:A,C,D

  • 第14题:

    What are three valid Juniper Networks IPS attack object types?() (Choose three.)

    • A、signature
    • B、anomaly
    • C、trojan
    • D、virus
    • E、chain

    正确答案:A,B,E

  • 第15题:

    What are three valid LDP message types?()

    • A、Path
    • B、Session
    • C、discovery
    • D、establishment
    • E、Advertisement

    正确答案:B,C,E

  • 第16题:

    多选题
    Which three message types are valid PIMv2 message types?()
    A

    Register

    B

    Register-Stop

    C

    Join/Prune

    D

    Reject

    E

    Register-Prune

    F

    Register-Join


    正确答案: F,D
    解析: 暂无解析

  • 第17题:

    多选题
    On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
    A

    ping

    B

    FTP

    C

    Telnet

    D

    HTTP

    E

    HTTPS


    正确答案: A,E
    解析: 暂无解析

  • 第18题:

    多选题
    What are three Juniper DX Cluster benefits?() (Choose three.)
    A

    performance

    B

    authorization

    C

    compression

    D

    protocol validation

    E

    UDP load balancing


    正确答案: C,A
    解析: 暂无解析

  • 第19题:

    多选题
    What are the three main parts of a syslog message? ()(Choose three.)
    A

    severity level

    B

    facility

    C

    log message name

    D

    time stamp

    E

    error codes

    F

    access privilege


    正确答案: B,A
    解析: 暂无解析

  • 第20题:

    多选题
    Which of the following three port types are valid Spanning Tree port types?(Choose the best threeanswers.)()
    A

    Designated port

    B

    Nonswitch port

    C

    Switch port

    D

    Nonroot port

    E

    Nondesignated port

    F

    Root port


    正确答案: A,B
    解析: 暂无解析

  • 第21题:

    多选题
    Which three are true about MPLS LSP establishment using RSVP?() (Choose three.)
    A

    Ordered Control

    B

    Independent Control

    C

    Down Stream Unsolicited

    D

    Liberal Label Management

    E

    Down Stream On Demand


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    多选题
    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。
    A

    FTP

    B

    Telnet

    C

    SMTP

    D

    DNS

    E

    HTTP

    F

    POP3


    正确答案: A,E
    解析: 暂无解析

  • 第23题:

    多选题
    What are three valid LDP message types?()
    A

    Path

    B

    Session

    C

    discovery

    D

    establishment

    E

    Advertisement


    正确答案: C,E
    解析: 暂无解析