多选题Which three must be configured for the Packet Capture tool to collect all required data? ()(Choose three.)AEnter the password.BModify the delete time to 3 hours.CSet the interface to local, remote or both.DIncrease the snap length of the Packet Capture

题目
多选题
Which three must be configured for the Packet Capture tool to collect all required data? ()(Choose three.)
A

Enter the password.

B

Modify the delete time to 3 hours.

C

Set the interface to local, remote or both.

D

Increase the snap length of the Packet Capture configuration.

E

Set the Packet Capture size to greater than the actual data flow


相似考题
更多“多选题Which three must be configured for the Packet Capture tool to collect all required data? ()(Choose three.)AEnter the password.BModify the delete time to 3 hours.CSet the interface to local, remote or both.DIncrease the snap length of the Packet Capture”相关问题
  • 第1题:

    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。

    A.FTP

    B.Telnet

    C.SMTP

    D.DNS

    E.HTTP

    F.POP3


    参考答案:D, E, F

  • 第2题:

    Which three BGP attributes are always communicated in a BGP update packet? ()(Choose three.)

    • A、MED
    • B、Origin
    • C、AS Path
    • D、Next Hop
    • E、Aggregator

    正确答案:B,C,D

  • 第3题:

    A router receives an IPv6 packet which is 2000 bytes in length. The MTU of the outgoing interface is 1500 bytes. Which action will the router take?()

    • A、Forward the packet.
    • B、Fragment the packet.
    • C、Drop the packet silently.
    • D、Drop the packet and send an ICMPv6 message.

    正确答案:D

  • 第4题:

    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()

    • A、FTP
    • B、Telnet
    • C、SMTP
    • D、DNS
    • E、HTTP
    • F、POP3

    正确答案:D,E,F

  • 第5题:

    You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior?()

    • A、The authenticator is not licensed to support Junos Pulse.
    • B、The authenticator did not receive the EAP-response/identity packet.
    • C、The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.
    • D、The authenticator is sending the request over its loopback interface.
    • E、The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.

    正确答案:B,C,E

  • 第6题:

    What are three WAN reports that can be generated with the WX device?() (Choose three.)

    • A、throughput
    • B、performance
    • C、pass-through
    • D、application summary
    • E、packet size distribution

    正确答案:A,B,D

  • 第7题:

    多选题
    In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)
    A

    IP protocol

    B

    IP time-to-live

    C

    source and destination IP address

    D

    source and destination MAC address

    E

    source and destination TCP/UDP port


    正确答案: C,A
    解析: 暂无解析

  • 第8题:

    多选题
    Which three must be configured for the Packet Capture tool to collect all required data? ()(Choose three.)
    A

    Enter the password.

    B

    Modify the delete time to 3 hours.

    C

    Set the interface to local, remote or both.

    D

    Increase the snap length of the Packet Capture configuration.

    E

    Set the Packet Capture size to greater than the actual data flow


    正确答案: D,C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?()
    A

     Daily

    B

     Incremental

    C

     Normal

    D

     Differential


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    Which three parameters are configured in the IKE policy? ()(Choose three.)
    A

    mode

    B

    preshared key

    C

    external interface

    D

    security proposals

    E

    dead peer detection settings


    正确答案: D,E
    解析: 暂无解析

  • 第11题:

    多选题
    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。
    A

    FTP

    B

    Telnet

    C

    SMTP

    D

    DNS

    E

    HTTP

    F

    POP3


    正确答案: A,E
    解析: 暂无解析

  • 第12题:

    多选题
    Which three packet interception methods are configurable in WX devices?() (Choose three.)
    A

    OSPF

    B

    WCCP

    C

    policy based routing

    D

    route injection using RIPv1

    E

    route injection using RIPv2


    正确答案: D,A
    解析: 暂无解析

  • 第13题:

    Which three must be configured for the Packet Capture tool to collect all required data? ()(Choose three.)

    • A、Enter the password.
    • B、Modify the delete time to 3 hours.
    • C、Set the interface to local, remote or both.
    • D、Increase the snap length of the Packet Capture configuration.
    • E、Set the Packet Capture size to greater than the actual data flow

    正确答案:A,C,E

  • 第14题:

    Which three packet interception methods are configurable in WX devices?() (Choose three.)

    • A、OSPF
    • B、WCCP
    • C、policy based routing
    • D、route injection using RIPv1
    • E、route injection using RIPv2

    正确答案:B,C,E

  • 第15题:

    Which three IP multicast group concepts are true? (Choose three.) ()

    • A、 If a packet is sent to a multicast group address, all members of the multicast group will receive it
    • B、 If a packet is sent to a multicast group address, the multicast frame contains the source multicast  address
    • C、 A router does not have to be a member of a multicast group to receive multicast data.
    • D、 A router does not have to be a member of a multicast group to send to the group.
    • E、 A router must be a member of a multicast group to receive multicast data.
    • F、 A router must be a member of a multicast group to send to the group.

    正确答案:A,D,E

  • 第16题:

    Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?()

    • A、 Daily
    • B、 Incremental
    • C、 Normal
    • D、 Differential

    正确答案:B

  • 第17题:

    In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)

    • A、IP protocol
    • B、IP time-to-live
    • C、source and destination IP address
    • D、source and destination MAC address
    • E、source and destination TCP/UDP port

    正确答案:A,C,E

  • 第18题:

    多选题
    Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)
    A

    Apply the method list to an interface

    B

    Specify the default method list and apply it to the interface

    C

    Enable AAA

    D

    Define a method list


    正确答案: C,A
    解析: 暂无解析

  • 第19题:

    多选题
    Which three BGP attributes are always communicated in a BGP update packet? ()(Choose three.)
    A

    MED

    B

    Origin

    C

    AS Path

    D

    Next Hop

    E

    Aggregator


    正确答案: E,D
    解析: 暂无解析

  • 第20题:

    多选题
    You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior?()
    A

    The authenticator is not licensed to support Junos Pulse.

    B

    The authenticator did not receive the EAP-response/identity packet.

    C

    The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.

    D

    The authenticator is sending the request over its loopback interface.

    E

    The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    多选题
    You are the network administrator for your company. The network contains 12 Windows Server 2003 computers and 300 Windows XP Professional computers. Three servers named Server4, Server5, and Server6 run a critical business application. When performing performance baselining on these three servers, you notice that Server6 has a larger number of concurrently connected users at any given moment than Server4 or Server5. The additional workload is causing performance problems on Server6. You need to identify which client computers are connecting to Server6.You plan to run Network Monitor on Server6 to capture all packets sent to Server6. The capture task must be configured to meet the following requirements.To reduce the size of the captured data, you want to capture only the packet headers.If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets.   Which two tasks should you perform to configure Network Monitor?()
    A

    Configure the Network Monitor display filters.

    B

    Configure the Network Monitor capture filters.

    C

    Increase the Network Monitor buffer size setting.

    D

    Decrease the Network Monitor buffer size setting.

    E

    Increase the Network Monitor frame size setting.

    F

    Decrease the Network Monitor frame size setting.


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which three IP multicast group concepts are true? (Choose three.) ()
    A

    If a packet is sent to a multicast group address, all members of the multicast group will receive it

    B

    If a packet is sent to a multicast group address, the multicast frame contains the source multicast  address

    C

    A router does not have to be a member of a multicast group to receive multicast data.

    D

    A router does not have to be a member of a multicast group to send to the group.

    E

    A router must be a member of a multicast group to receive multicast data.

    F

    A router must be a member of a multicast group to send to the group.


    正确答案: A,D,E
    解析: 暂无解析

  • 第23题:

    多选题
    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()
    A

    FTP

    B

    Telnet

    C

    SMTP

    D

    DNS

    E

    HTTP

    F

    POP3


    正确答案: B,E
    解析: 暂无解析

  • 第24题:

    多选题
    Overlay Transport Virtualization (OTV) overlay interface is a logical multiaccess and multicast- capable interface that must be explicitly defined by the user and where the entire OTV configuration is applied. Which statements are true about OTV overlay interface?()
    A

    When an OTV edge device receives a Layer 2 frame destined for a remote data center site, the frame is logically forwarded to the overlay interface.

    B

    The OTV edge device performs the dynamic OTV encapsulation on the Layer 2 packet and sends it to the join interface toward the routed domain.

    C

    When the OTV edge device receives a Layer 2 frame destined for a remote data center site, the frame is logically forwarded to the join interface.

    D

    The OTV edge device performs the dynamic OTV encapsulation on the Layer 2 packet and sends it to the overlay interface toward the routed domain.


    正确答案: D,B
    解析: 暂无解析