Excluded traffic is not accelerated.
Excluded traffic is only compressed.
Source/destination filter applies to all traffic sent from LAN to WAN.
Source/destination filters work in packet interception mode using RIPv2.
第1题:
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4 (Choose two.)()。
第2题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第3题:
Which location will be recommended for extended or extended named ACLs?()
第4题:
Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
第5题:
Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose three.)()
第6题:
What statement about Transit AS is true?()
第7题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第8题:
The statistics show savings for all CIFS traffic.
The traffic transfered over 4,000 seconds faster.
There was a bandwidth savings of almost 68.9%.
The acceleration is only working for 68.9% of the traffic
第9题:
DNS traffic is denied.
HTTP traffic is denied.
FTP traffic is permitted.
SMTP traffic is permitted.
第10题:
Excluded traffic is not accelerated.
Excluded traffic is only compressed.
Source/destination filter applies to all traffic sent from LAN to WAN.
Source/destination filters work in packet interception mode using RIPv2.
第11题:
The IDS is in the traffic path.
The IDS can send TCP resets to the source device.
The IDS can send TCP resets to the destination device.
The IDS listens promiscuously to all traffic on the network.
Default operation is for the IDS to discard malicious traffic.
第12题:
It establishes a static route to the 172.16.3.0 network.
It establishes a static route to the 192.168.2.0 network.
It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
It uses the default administrative distance.
It is a route that would be used last if other routes to the same destination exist.
第13题:
Which two statements about an IDS are true?()
第14题:
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()
第15题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第16题:
Which two statements are true when source/destination filters are enabled? ()(Choose two.)
第17题:
Which two statements are true about network voice traffic? (Choose two.)()
第18题:
Which two statements are true for a security policy? ()(Choose two.)
第19题:
It establishes a static route to the 172.16.3.0 network
It establishes a static route to the 192.168.2.0 network
It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network
It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4
It uses the default administrative distance
It is a route that would be used last if other routes to the same destination exist
第20题:
Voice traffic is affected more by link speed than FTP traffic is.
Voice traffic is affected more by packet delays than FTP traffic is.
Voice streams involve larger packet sizes than most TCP network traffic involves.
Voice traffic is more sensitive to packet loss than TCP network traffic is.
Voice traffic requires QOS mechanisms only in heavily loaded network segments.
第21题:
It controls inter-zone traffic.
It controls intra-zone traffic.
It is named with a system-defined name.
It controls traffic destined to the device's ingress interface.
第22题:
when using the established keyword,a location close to the destination point to ensure that return trafficis allowed
an intermediate location to filter as much traffic as possible ActualTests.com
a location as close to the source traffic as possible
a location as close to the destination traffic as possible
第23题:
to control vty access into a router
to control broadcast traffic through a router
to filter traffic as it passes through a router
to filter traffic that originates from the router
to replace passwords as a line of defense against security incursions
第24题:
Traffic is permitted from the trust zone to the untrust zone.
Intrazone traffic in the trust zone is permitted.
All traffic through the device is denied.
The policy is matched only when no other matching policies are found.