多选题Click the Exhibit button. host_a is in subnet_a and host_b is in subnet_b. Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?()ADNS traffic is denied.BTelnet traffic is denied.CSMTP traffic is den

题目
多选题
Click the Exhibit button. host_a is in subnet_a and host_b is in subnet_b. Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?()
A

DNS traffic is denied.

B

Telnet traffic is denied.

C

SMTP traffic is denied.

D

Ping traffic is permitted.


相似考题
参考答案和解析
正确答案: B,D
解析: 暂无解析
更多“多选题Click the Exhibit button. host_a is in subnet_a and host_b is in subnet_b. Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?()ADNS traffic is denied.BTelnet traffic is denied.CSMTP traffic is den”相关问题
  • 第1题:

    Click the Exhibit button.host_a is in subnet_a and host_b is in subnet_b.Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?()

    A. DNS traffic is denied.

    B. Telnet traffic is denied.

    C. SMTP traffic is denied.

    D. Ping traffic is permitted.


    参考答案:B, D

  • 第2题:

    Which two tasks are accomplished by the firewall filter shown in the exhibit?()

    A. Traffic matching the my-policy term will be counted and accepted.

    B. Traffic matching the my-policy term will be counted and discarded.

    C. Traffic not matching the my-policy term will be discarded.

    D. Traffic not matching the my-policy term will be accepted.


    参考答案:A, C

  • 第3题:

    Refer to the exhibit. Which statement is true? ()

    A. Only traffic with a destination from 10.10.0.0/19 will be permitted.

    B. Router RAR1 will accept only route 10.10.0.0/19 from its BGP neighbor.

    C. Only traffic going to 10.10.0.0/19 will be permitted.

    D. Router RAR1 will send only route 10.10.0.0/19 to its BGP neighbor.


    参考答案:B

  • 第4题:

    Which two statements are true about traffic shaping and traffic policing?()

    • A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCP
    • B、both traffic shaping and traffic policing support the marking and re-marking of traffic
    • C、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing traffic
    • D、traffic shaping queues excess traffic whereas traffic policing discards excess traffic
    • E、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

    正确答案:C,D

  • 第5题:

    Which statement about HTTPS decryption on the WSA is true?() 

    • A、if enabled, all HTTPS traffic must be decrypted
    • B、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
    • C、decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
    • D、object size can be used to determine whether the HTTPS traffic is to be decrypted

    正确答案:B

  • 第6题:

    Click the Exhibit button.Which two are correct about CIFS acceleration based on the exhibit?() (Choose two.)

    • A、The statistics show savings for all CIFS traffic.
    • B、The traffic transfered over 4,000 seconds faster.
    • C、There was a bandwidth savings of almost 68.9%.
    • D、The acceleration is only working for 68.9% of the traffic

    正确答案:A,B

  • 第7题:

    单选题
    Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.
    A

    DNS traffic is denied.

    B

    Telnet traffic is denied.

    C

    SMTP traffic is denied.

    D

    Ping traffic is permitted


    正确答案: C
    解析: 暂无解析

  • 第8题:

    多选题
    Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
    A

    DNS traffic is denied.

    B

    HTTP traffic is denied.

    C

    FTP traffic is permitted.

    D

    SMTP traffic is permitted.


    正确答案: C,B
    解析: 暂无解析

  • 第9题:

    单选题
    Which statement about HTTPS decryption on the WSA is true?()
    A

    if enabled, all HTTPS traffic must be decrypted

    B

    if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted

    C

    decrypted HTTPS traffic is sent unencrypted across the enterprise intranet

    D

    object size can be used to determine whether the HTTPS traffic is to be decrypted


    正确答案: B
    解析: 暂无解析

  • 第10题:

    多选题
    Refer to the exhibit. On the basis of the information in the exhibit, which two statements are true?()
    A

    When traffic is sent from the ISP to autonomous system 64512, the traffic will be forwarded toSanJose2 because of the higher MED value of SanJose2

    B

    The serial 0/0/1 interface on the ISP router has been configured with the set metric 50command

    C

    The output was generated by entering the show ip bgp command on the SanJose1 router

    D

    The output was generated by entering the show ip bgp command on the ISP router

    E

    The serial 0/0/1 interface on the ISP router has been configured with the set metric 75command

    F

    When traffic is sent from the ISP to autonomous system 64512, the traffic will be forwarded toSanJose1 because of the lower MED value of SanJose1


    正确答案: A,E
    解析: 暂无解析

  • 第11题:

    多选题
    Which statement is true about the comparison of voice traffic with video traffic?()
    A

    video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows

    B

    latency requirements are less stringent for video traffic than for voice traffic

    C

    video traffic is less sensitive to dropped packets than for voice traffic

    D

    video traffic requires the retransmission capabilities of TCP whereas voice uses UDP

    E

    video traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows

    F

    voice traffic requires the retransmission capabilities of TCP whereas video uses UDP


    正确答案: B,D
    解析: 暂无解析

  • 第12题:

    单选题
    Assuming both paths shown in the exhibit are available, which statement is correct?()
    A

    Traffic matching the default route will use 10.1.1.1 as the next hop.

    B

    Traffic matching the default route will use 10.1.1.254 as the next hop.

    C

    Traffic matching the default route will be load-balanced per packet across both next hops.

    D

    Traffic matching the default route will be load-balanced per flow across both next hops.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Click the Exhibit button.Which two are correct about CIFS acceleration based on the exhibit?() (Choose two.)

    A. The statistics show savings for all CIFS traffic.

    B. The traffic transfered over 4,000 seconds faster.

    C. There was a bandwidth savings of almost 68.9%.

    D. The acceleration is only working for 68.9% of the traffic


    参考答案:A, B

  • 第14题:

    Assuming both paths shown in the exhibit are available, which statement is correct?()

    A. Traffic matching the default route will use 10.1.1.1 as the next hop.

    B. Traffic matching the default route will use 10.1.1.254 as the next hop.

    C. Traffic matching the default route will be load-balanced per packet across both next hops.

    D. Traffic matching the default route will be load-balanced per flow across both next hops.


    参考答案:B

  • 第15题:

    Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for 172.16.12.10 if the traffic is processed by this ACL?()

    A.Traffic will be dropped per line 30 of the ACL.

    B.Traffic will be accepted per line 40 of the ACL.

    C.Traffic will be dropped, because of the implicit deny all at the end of the ACL.

    D.Traffic will be accepted, because the source address is not covered by the ACL.


    参考答案:C

  • 第16题:

    Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }

    • A、DNS traffic is denied.
    • B、HTTP traffic is denied.
    • C、FTP traffic is permitted.
    • D、SMTP traffic is permitted.

    正确答案:A,C

  • 第17题:

    What statement about Transit AS is true?()

    • A、Traffic and prefixes originating from Source AS are carried across a Transit AS to reach theirdestination AS
    • B、Traffic and prefixes originating from Transit AS are carried across a Stub AS to their destination AS
    • C、Traffic and prefixes originating from Transit AS are carried across a Stub AS to their Source AS
    • D、None of the above

    正确答案:A

  • 第18题:

    Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.

    • A、DNS traffic is denied.
    • B、Telnet traffic is denied.
    • C、SMTP traffic is denied.
    • D、Ping traffic is permitted

    正确答案:B

  • 第19题:

    多选题
    Click the Exhibit button.Which two are correct about CIFS acceleration based on the exhibit?() (Choose two.)
    A

    The statistics show savings for all CIFS traffic.

    B

    The traffic transfered over 4,000 seconds faster.

    C

    There was a bandwidth savings of almost 68.9%.

    D

    The acceleration is only working for 68.9% of the traffic


    正确答案: A,B
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true about traffic shaping and traffic policing?()
    A

    both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCP

    B

    both traffic shaping and traffic policing support the marking and re-marking of traffic

    C

    the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing traffic

    D

    traffic shaping queues excess traffic whereas traffic policing discards excess traffic

    E

    traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate


    正确答案: C,D
    解析: 暂无解析

  • 第21题:

    单选题
    Refer to the exhibit. Which statement is true about a voice VLAN?()
    A

     Physically the voice network and the data network are separate.

    B

     The voice traffic will normally be on a different IP subnet than will the data traffic.

    C

     End user intervention is necessary to place the phone into the proper VLAN.

    D

     The same security policy should be implemented for both voice and data traffic.

    E

     The data VLAN must be configured as the native VLAN.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()
    A

    The traffic will be rejected

    B

    The traffic will be dropped

    C

    The traffic will be forwarded

    D

    The traffic will be policed


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()
    A

    The traffic will be rejected.

    B

    The traffic will be dropped.

    C

    The traffic will be forwarded.

    D

    The traffic will be policed.


    正确答案: D
    解析: 暂无解析