Addresses used for NAT pools should never overlap.
If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.
If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.
Dynamic source NAT rules take precedence over static source NAT rules.
第1题:
A. It is achieved by using more than one HSRP group.
B. It is done in regards to either round robin or weight basis.
C. It is used to offload the active router in a certain HSRP group.
D. Single group HSRP is used to achieve more efficient link utilization.
E. The return traffic is influenced by HSRP load sharing configuration.
第2题:
Which two statements about static NAT are true? ()(Choose two.)
第3题:
Which statements are true concerning NAT? ()
第4题:
Which two statements about static NAT are true?()
第5题:
Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)
第6题:
Which two statements regarding symmetric key encryption are true?() (Choose two.)
第7题:
Voice traffic is affected more by link speed than FTP traffic is.
Voice traffic is affected more by packet delays than FTP traffic is.
Voice streams involve larger packet sizes than most TCP network traffic involves.
Voice traffic is more sensitive to packet loss than TCP network traffic is.
Voice traffic requires QOS mechanisms only in heavily loaded network segments.
第8题:
interface-based source NAT
static source NAT
pool-based source NAT with PAT
pool-based source NAT without PAT
第9题:
Source NAT works only with source pools.
Destination NAT is required to translate the reply traffic.
Source NAT does not require a security policy to function.
The egress interface IP address can be used for source NAT
第10题:
It is necessary to forward ARP requests to remote hosts.
It is necessary when translated traffic belongs to the same subnet as the ingress interface.
It is not automatic and you must configure it.
It is enabled by default and you do not need to configure it.
第11题:
It is achieved by using more than one HSRP group.
It is done in regards to either round robin or weight basis.
It is used to offload the active router in a certain HSRP group.
Single group HSRP is used to achieve more efficient link utilization.
The return traffic is influenced by HSRP load sharing configuration.
第12题:
PAT is not supported.
PAT is enabled by default.
It supports the address-persistent configuration option.
It supports the junos-global configuration option.
第13题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第14题:
Which two statements are true when source/destination filters are enabled? ()(Choose two.)
第15题:
Which two statements are true about network voice traffic? (Choose two.)()
第16题:
Which statement is true about source NAT?()
第17题:
Which two statements are true about pool-based source NAT? ()(Choose two.)
第18题:
Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)
第19题:
Accelerates NFS file sharing, MAPI, and HTTP 1.0.
Accelerates CIFS, MAPI, and additional TCP traffic specified by app rules.
Accelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.
Accelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.
第20题:
routing-instance
zone
interface
policy
rule-set
第21题:
Static NAT can only be used with destination NAT.
Static NAT rules take precedence over overlapping dynamic NAT rules.
NAT rules take precedence over overlapping static NAT rules.
A reverse mapping is automatically created.
第22题:
Static NAT can only be used with destination NAT.
Static NAT rules take precedence over overlapping dynamic NAT rules.
Dynamic NAT rules take precedence over overlapping static NAT rules.
A reverse mapping is automatically created.
第23题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.