ICMP
SNMP
TCP
HTTPS
第1题:
A. TFTP
B. FTP
C. SCP
D. SFTP
第2题:
The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()
第3题:
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
第4题:
You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()
第5题:
You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
第6题:
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()
第7题:
PPP
UDP
TCP
ICMP
第8题:
It is necessary to forward ARP requests to remote hosts.
It is necessary when translated traffic belongs to the same subnet as the ingress interface.
It is not automatic and you must configure it.
It is enabled by default and you do not need to configure it.
第9题:
a shared single interface
the ability to track serial interfaces
UDP-based hello packets
the impact of flapping links if timers are too low
第10题:
DBA_AUDIT_TRAIL
DBA_AUDIT_SESSION
DBA_FGA_AUDIT_TRAIL
DBA_COMMON_AUDIT_TRAIL
第11题:
Trusts between domains
Number of BDC s in each domain
Users and resources in each domain
Current hardware for domain controllers
Current amount of replication traffic over WAN links
第12题:
TFTP
FTP
SCP
SFTP
第13题:
Which two of these are differences between traffic policing and traffic shaping?()
第14题:
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()
第15题:
You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
第16题:
You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?()
第17题:
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
第18题:
with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available again
with policing you can tune the buffer usage for traffic exceeding the specified CIR
with shaping you can tune the buffer usage for traffic exceeding the specified CIR
shaping should only be applied for ingress traffic,policing only for egress
policing uses a token bucket algorithm,shaping uses an SPD algorithm
第19题:
Firewall filters are stateless.
Firewall filters are used to control routing information that is exchanged between devices.
Firewall filters are used to control traffic passing through the device.
Firewall filters can only be applied to traffic entering the device.
第20题:
The endpoints can use agentless access.
Encrypted traffic flows between the endpoint and the enforcer.
Encrypted traffic flows between the endpoint and the protected resource
The endpoints can use the Odyssey Access Client.
第21题:
access profile
IKE parameters
tunneled interface
redirect policy
第22题:
MSDP
Routing policy
Administrative scoping
Bootstrap export policy
第23题:
Business-critical traffic will be sorted into two QoS classes.
Real-time traffic will be sorted into one QoS class.
Voice traffic will be considered real-time traffic while call signaling will be considered business-critical.
All traffic except real-time will be considered best-effort.
Routing, management, and transactional traffic will be considered business-critical.
Voice and call signaling traffic will be considered real-time.