更多“多选题What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)AAdmin DeviceBDevice Setup TopologyCCompression EndpointsDDevice Setup Advanced Topology”相关问题
  • 第1题:

    When defining an application for AppFlow acceleration, which two must be configured on the WX device?()(Choose two.)

    A. Define application type.

    B. Enable AppFlow for the application.

    C. Enable monitoring for the application.

    D. Define source and destination IP addresses.


    参考答案:A, B

  • 第2题:

    What are two ways to view the system log files on a WX device? ()(Choose two.)

    A. Use the CLI and enter show log.

    B. Use the CLI and enter show all.

    C. Use the CLI and enter show logging.

    D. In WebView, choose Admin > Tools > Display System Log.


    参考答案:A, D

  • 第3题:

    What are two instances when a WX device route carves? ()(Choose two.)

    • A、It occurs every 29 hours.
    • B、Packet interception mode is enabled.
    • C、The host is unreachable on the local subnet.
    • D、The subnet is unreachable using the advertised router.

    正确答案:C,D

  • 第4题:

    When defining an application for AppFlow acceleration, which two must be configured on the WX device?()(Choose two.)

    • A、Define application type.
    • B、Enable AppFlow for the application.
    • C、Enable monitoring for the application.
    • D、Define source and destination IP addresses.

    正确答案:A,B

  • 第5题:

    Which two methods are used to assign an IP address to a WX device? ()(Choose two.)

    • A、SSH
    • B、Telnet
    • C、WebView
    • D、device front panel
    • E、serial console (command-line interface)

    正确答案:D,E

  • 第6题:

    What are two ways to view the system log files on a WX device? ()(Choose two.)

    • A、Use the CLI and enter show log.
    • B、Use the CLI and enter show all.
    • C、Use the CLI and enter show logging.
    • D、In WebView, choose Admin > Tools > Display System Log.

    正确答案:A,D

  • 第7题:

    多选题
    What are two rulebase types within an IPS policy on an SRX Series device?() (Choose two.)
    A

    rulebase-ips

    B

    rulebase-ignore

    C

    rulebase-idp

    D

    rulebase-exempt


    正确答案: D,C
    解析: 暂无解析

  • 第8题:

    多选题
    What are two instances when a WX device route carves? ()(Choose two.)
    A

    It occurs every 29 hours.

    B

    Packet interception mode is enabled.

    C

    The host is unreachable on the local subnet.

    D

    The subnet is unreachable using the advertised router.


    正确答案: C,D
    解析: 暂无解析

  • 第9题:

    多选题
    What are two requirements when using AppFlow?() (Choose two.)
    A

    Quality of service must be enabled.

    B

    NSC compression must be enabled.

    C

    PFA's TCP Acceleration (AFP) must be enabled.

    D

    AppFlow must be configured on the client-side device first.


    正确答案: C,B
    解析: 暂无解析

  • 第10题:

    多选题
    Which two methods are used to assign an IP address to a WX device? ()(Choose two.)
    A

    SSH

    B

    Telnet

    C

    WebView

    D

    device front panel

    E

    serial console (command-line interface)


    正确答案: B,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two types of optimization does the WX 60 device perform when Exchange 2003 and Outlook 2003 areused in the network? ()(Choose two.)
    A

    Packet Flow Acceleration

    B

    Network Sequence Caching

    C

    AppFlow's MAPI acceleration

    D

    Molecular Sequence Reduction


    正确答案: A,B
    解析: 暂无解析

  • 第12题:

    多选题
    What are two merits of having a correct time setting on each WX/WXC device in a community? ()(Choose two.)
    A

    Ensures connectivity to the registration server.

    B

    Allows WX devices to synchronize with one another.

    C

    Helps in the maintenance of WX devices using WX CMS.

    D

    Generates accurate and consistent monitoring reports.


    正确答案: A,B
    解析: 暂无解析

  • 第13题:

    Which two methods are used to assign an IP address to a WX device? ()(Choose two.)

    A. SSH

    B. Telnet

    C. WebView

    D. device front panel

    E. serial console (command-line interface)


    参考答案:D, E

  • 第14题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    • A、Allow unrestricted access to the console or VTY ports
    • B、Use a firewall to restrict access from the outside to the network devices
    • C、Always use Telnet to access the device command line because its data is automatically encrypted
    • D、Use SSH or another encrypted and authenticated transport to access device configurations
    • E、Prevent the loss of passwords by disabling password encryption

    正确答案:B,D

  • 第15题:

    What must be enabled to view the WAN performance reports?()

    • A、Monitor > WAN > WAN Throughput
    • B、Monitor > WAN > WAN Performance
    • C、Device Setup > Applications > Monitoring
    • D、Device Setup > Advanced > WAN Performance Monitor

    正确答案:D

  • 第16题:

    What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)

    • A、Admin > Device
    • B、Device Setup > Topology
    • C、Compression > Endpoints
    • D、Device Setup > Advanced > Topology

    正确答案:C,D

  • 第17题:

    What are two merits of having a correct time setting on each WX/WXC device in a community? ()(Choose two.)

    • A、Ensures connectivity to the registration server.
    • B、Allows WX devices to synchronize with one another.
    • C、Helps in the maintenance of WX devices using WX CMS.
    • D、Generates accurate and consistent monitoring reports.

    正确答案:C,D

  • 第18题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
    A

    Allow unrestricted access to the console or VTY ports

    B

    Use a firewall to restrict access from the outside to the network devices

    C

    Always use Telnet to access the device command line because its data is automatically encrypted

    D

    Use SSH or another encrypted and authenticated transport to access device configurations

    E

    Prevent the loss of passwords by disabling password encryption


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    多选题
    When defining an application for AppFlow acceleration, which two must be configured on the WX device?()(Choose two.)
    A

    Define application type.

    B

    Enable AppFlow for the application.

    C

    Enable monitoring for the application.

    D

    Define source and destination IP addresses.


    正确答案: A,B
    解析: 暂无解析

  • 第20题:

    多选题
    What are two ways to verify if a WX device is configured as a hub, a spoke, or a mesh device? ()(Choose two.)
    A

    Admin > Device

    B

    Device Setup > Topology

    C

    Compression > Endpoints

    D

    Device Setup > Advanced > Topology


    正确答案: A,B
    解析: 暂无解析

  • 第21题:

    多选题
    What are two requirements when using AppFlow? ()(Choose two.)
    A

    Quality of service must be enabled.

    B

    NSC compression must be enabled.

    C

    PFA's TCP Acceleration (AFP) must be enabled.

    D

    AppFlow must be configured on the client-side device first


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    多选题
    What are two ways to view the system log files on a WX device? ()(Choose two.)
    A

    Use the CLI and enter show log.

    B

    Use the CLI and enter show all.

    C

    Use the CLI and enter show logging.

    D

    In WebView, choose Admin > Tools > Display System Log.


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    多选题
    What are two requirements when using Packet Flow Acceleration? ()(Choose two.)
    A

    Traffic needs be compressed.

    B

    Quality of service must be enabled.

    C

    A service tunnel must exist in at least one direction.

    D

    PFA must be enabled on the client-side WX device.


    正确答案: B,A
    解析: 暂无解析

  • 第24题:

    多选题
    What are two reasons why a device will fail to register to a community? ()(Choose two.)
    A

    The community name is not configured.

    B

    The registration server password is incorrect.

    C

    The registration server IP address is incorrect.

    D

    The backup registration server IP address is missing.


    正确答案: B,C
    解析: 暂无解析