CU
SDX
SAP
J-Web
J-Config
第1题:
What are two methods of accessing a Juniper enterprise router?()
第2题:
What are three Juniper DX Cluster benefits?() (Choose three.)
第3题:
Which three are used to create a separate multicast and unicast forwarding topology on a Juniper Networks router?()
第4题:
What are three methods for managing a Juniper Enterprise Router?()
第5题:
4
15
48
50
第6题:
RSH
HTTPS
console
J-Config
第7题:
null password
simple password
message digest 5
Password Authentication Protocol
Challenge Handshake Authentication Protocol
第8题:
aaa domain-map
radius attributes
tunnel groups
tunnel services profile
l2tp destination profile
第9题:
MBGP
RIB groups
firewall filters
routing policy
filter based forwarding (FBF)
第10题:
File system snapshots
Mysqldumpslow
Mysqlhotcopy
Mysqldump with – binary-data option
Mysql Enterprise Backup
第11题:
The system log has a proprietary format.
System logs must be sent to a remote device.
New system logs can be created and archived.
Most software processes create their own logs.
第12题:
signature
anomaly
trojan
virus
chain
第13题:
On a Juniper router,what is the default file used for syslog messages?()
第14题:
What are the three OSPF authentication methods supported on the ERX Edge Router?()
第15题:
How many committed configuration files are stored on the Juniper Networks enterprise router?()
第16题:
What are two valid initial configuration methods supported on Juniper routers?()
第17题:
CU
SDX
SAP
J-Web
J-Config
第18题:
activity audit
administration
policy establishment
technology implementation
第19题:
CLI
J-Web
JUNOScope
PCMCIA flash card
第20题:
MBGP
RIB groups
Routing policy
Firewall filters
第21题:
involution
encoding
sampling
quantization
compression
companding
第22题:
IGMP
IGMP snooping
PIM
CGMP
static assignment
CDP
第23题:
rapid response time
head count
connectivity
security threats
reduced complexity
disaster recovery
第24题:
profile
policy list
domain map
RADIUS VSA
classifier ACL