firewall filters
data encryption
routing protocol authentication
support for BGP path mtu discovery
automatic discovery for IPSEC neighbors
第1题:
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
第2题:
Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()
第3题:
Which IOS features are used to avoid Routing loops when dynamic Routing protocols are used betweenPE and CE in MPLS-VPN networks?()
第4题:
Which BGP attribute is considered first as a tie-breaker in JUNOS software?()
第5题:
Which three JUNOS software features allow for increased security on your network?()
第6题:
In JUNOS software, which three routing protocols can be used to route IPv6?()
第7题:
Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()
第8题:
show bgp group
show bgp status
show bgp summary
show bgp neighbor
show protocols bgp
第9题:
TestKingB> telnet
TestKingB > ping
TestKingB > trace
TestKingB > show ip route
TestKingB > show interface
TestKingB > show cdp neighbors
第10题:
IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
IDP inspects traffic up to the Presentation layer.
IDP inspects traffic up to the Application layer.
第11题:
MAC address
DNS server
DHCP server
resolve address
endpoint address
第12题:
IKE keepalives are unidirectional and sent every ten seconds
IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
第13题:
Which three statements are true regarding IDP?()
第14题:
Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?()
第15题:
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()
第16题:
Which BGP attribute is considered first as a tie-breaker in JUNOS software?()
第17题:
Which two statements are true regarding IDP?()
第18题:
Which three commands allow you to verify the current state of your BGP neighbors?()
第19题:
VPN establishment
stateful ARP lookups
Dynamic ARP inspection
Network Address Translation
inspection of packets at higher levels (Layer 4 and above)
第20题:
Spanning Tree Protocol(STP)
Delay reduction
Hot Standby Routing Protocol(HSRP)
Dynamic routing protocols
Quality of Service(QoS)
Jitter management
第21题:
firewall filters
data encryption
routing protocol authentication
support for BGP path mtu discovery
automatic discovery for IPSEC neighbors
第22题:
IS-IS
Static
RIPv2
OSPFv2
MP-BGP
第23题:
Firewall user authentication provides another layer of security in a network.
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
Firewall user authentication enables session-based forwarding.
Firewall user authentication is used as a last resort security method in a network.
第24题:
IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
IDP inspects traffic up to the Application layer.
IDP searches the data stream for specific attack patterns.
IDP inspects traffic up to the Presentation layer.
IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.