Choose the true statement regarding QoS pre-classify.()
第1题:
A. Tunnels are initiated by the LAC
B. Tunnels are initiated by the LNS
C. By default, subscriber authentication occurs on the LNS
D. By default, subscriber authentication occurs on the LAC
第2题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第3题:
Which two statements are true regarding L2TP? ()(Choose two.)
第4题:
Result Type is optional.
Result Type is mandatory.
Result Type can be changed after it is assigned to the function activity.
Result Type should belong to the same item type as the function activity
第5题:
May have Ethernet as well as non-Ethernet interfaces
Traditionally used as a standalone device for inter-VLAN communication
Makes use of TCAMs
Uses subinterfaces to define trunks
Can use both Layer 2 and Layer 3 to make forwarding decisions
Allows the definition of Switched Virtual Interfaces(SVI)
第6题:
BitVector32 answers = new BitVector32(1);
BitVector32 answers = new BitVector32(-1);
BitArray answers = new BitArray (1);
BitArray answers = new BitArray(-1);
第7题:
Only main mode can be used for IKE negotiation
A local-identity must be defined
It must be the initiator for IKE
A remote-identity must be defined
第8题:
They are emotionally, spiritually, intellectually and creatively developed.
They are confident, assertive, and people-aware.
They enjoy mutually satisfying personal relationships.
They choose companionship over solitude.
第9题:
Static NAT can only be used with destination NAT.
Static NAT rules take precedence over overlapping dynamic NAT rules.
NAT rules take precedence over overlapping static NAT rules.
A reverse mapping is automatically created.
第10题:
Which of the following statements are true for routers but not true for Layer 3 Ethernet switches?(Choose all that apply.)()
第11题:
Which three are true about MPLS LSP establishment using RSVP?() (Choose three.)
第12题:
Traffic is clear text
Traffic is encrypted
They are initiated by the LNS
They are initiated by the LAC
第13题:
Set the Disable Overlapped Recycling option to True.
Set the Shutdown Executable option to True.
Set the Disable Recycling for Configuration Changes option to True.
Set the Process Orphaning Enabled option to True.
第14题:
AH provides data integrity.
AH is identified by IP protocol 50.
AH is identified by IP protocol 51.
AH cannot work in conjunction with ESP
第15题:
Tunnels are initiated by the LAC
Tunnels are initiated by the LNS
By default, subscriber authentication occurs on the LNS
By default, subscriber authentication occurs on the LAC
第16题:
Excluded traffic is not accelerated.
Excluded traffic is only compressed.
Source/destination filter applies to all traffic sent from LAN to WAN.
Source/destination filters work in packet interception mode using RIPv2.
第17题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第18题:
PAT is not supported.
PAT is enabled by default.
It supports the address-persistent configuration option.
It supports the junos-global configuration option.