A.protocol
B.VLAN number
C.TCP or UDP port numbers
D.source switch port number
E.source IP address and destination IP address
F.source MAC address and destination MAC address
第1题:
What are the three main parts of a syslog message? ()(Choose three.)
第2题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第3题:
Which three statistics does the Executive report summarize?() (Choose three.)
第4题:
What are two reasons that a network administrator would use access lists? (Choose two.) ()。
第5题:
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
第6题:
What are three characteristics of a service tunnel? ()(Choose three.)
第7题:
What are three WAN reports that can be generated with the WX device?() (Choose three.)
第8题:
It is bidirectional.
It carries optimized traffic.
It can carry traffic using UDP.
It is formed only within a community
第9题:
profile
policy list
domain map
RADIUS VSA
classifier ACL
第10题:
routing-instance
zone
interface
policy
rule-set
第11题:
flags indicating the kind of autoconfiguration that can be done by hosts
default router information
/64 prefix that can be used on the link and the lifetime of the prefix
IPv6 DHCP server address information
第12题:
protocol
VLAN number
TCP or UDP port numbers
source switch port number
source IP address and destination IP address
source MAC address and destination MAC address
第13题:
An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL (Choose three.)()。
第14题:
What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)
第15题:
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
第16题:
An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three.)()
第17题:
Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)
第18题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第19题:
Installed Hardware serial numbers
The status of installed hardware
Installed hardware
Unique Device Identifier
system internal temperature
main power supply condition
第20题:
throughput
performance
pass-through
application summary
packet size distribution
第21题:
FTP
Telnet
SMTP
DNS
HTTP
POP3
第22题:
FTP
Telnet
SMTP
DNS
HTTP
POP3
第23题:
zone objects
policy objects
attack objects
alert and notify objects
network and address objects