Username
LDAP user
Certificate
Custom expressions
Source y IP
第1题:
What are three values that must be the same within a sequence of packets for Netflow to consider them a network flow?()
第2题:
What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()
第3题:
Files /tmp/file2 and /tmp/file3 are hard linked to /tmp/file1. What will the result be if a user makes changes to /tmp/file2 at the same time another user tries to delete /tmp/file1?()
第4题:
What are three default role-mapping rule values that are available for all realms?()
第5题:
An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.What is the default role-mapping behavior?()
第6题:
inet.0
inet4.0
inet.6
inet6.0
inet.3
第7题:
permit all packets matching the first three octets of the source address to all destinations
permit all packets matching the last octet of the destination address and accept all source addresses
permit all packets from the third subnet of the network address to all destinations
permit all packets matching the host bits in the source address to all destinations
permit all packets to destinations matching the first three octets in the destination address
第8题:
removes the entire CBAC configuration
removes all associated static ACLs
turns off the automatic audit feature in SDM
denies HTTP and Java applets to the inside interface but permits this traffic to the DMZ
resets all global timeouts and thresholds to the defaults
deletes all existing sessions
第9题:
antivirus (full AV, express AV)
antivirus (desktop AV)
Web filtering
antispam
firewall user authentication
第10题:
Failover between preference levels is the default.
One algothrim is failover within a preference level.
Failover across all preference levels is the default.
One algothrim is failover between preference levels.
One algothrim is failover across all preference levels.
第11题:
The CoS value is trusted for 802.1p or 802.1q tagged traffic.
The voice VLAN feature is disabled by default.
The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.
PortFast is automatically disabled when a voice VLAN is configured.
The default CoS value for incoming traffic is set to 0.
第12题:
The vendor must select a role from a list of eligible roles.
The vendor must select a rule from a list of eligible rules.
The vendor is automatically mapped to the first configured role
The vendor is automatically granted a merged role.
第13题:
A database administrator wants a unique IP address for each of three instances of a database. Normally,all instances run on a large production node,but they may fallover to different standby nodes according to the dynamic node priority configuration. What is the best way to obtain unique addresses for each of the three database instances?()
第14题:
What network information do you need when you plan to implement a VLAN-based solution?()
第15题:
A cluster node has three network interfaces that support three resource groups with three service IP labels. Each IP label uses IPAT via IP aliasing. One of the adapters fails, and all of the IP labels on it are moved to other interfaces as expected. The system supports the "hot swap" replacement of the network interfaces, and the system engineer has corrected the problem. What will happen to the service IP lab3els when the repaired adapter is noticed by HACMP?()
第16题:
Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()
第17题:
The EMPLOYEES table has these columns: LAST NAME VARCHAR2(35) SALARY NUMBER(8,2) HIRE_DATE DATE Management wants to add a default value to the SALARY column. You plan to alter the table by using this SQL statement: ALTER TABLE EMPLOYEES MODIFY ( SALARY DEFAULT 5000); What is true about your ALTER statement?()
第18题:
administrators
system monitoring
network operator
power users
admin
users’ assistant
第19题:
source IP address
source MAC address
egress interface
ingress interface
destination IP address
IP next-hop
第20题:
Boot to a password recovery window
Boot with the factory default image
Erase the system configuration and boot with the factory default IOS image
Erase the system configuration and boot from a TFTP-supplied IOS image
Erase the System Configuration
第21题:
Move the Preferred Members role-mapping rule to the top of the list.
Remove the Preferred Members role from the role-mapping rule.
Edit the Preferred Members role-mapping rule so that the username is equal to *.
Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.
Edit the Preferred Members role-mapping rule and select Stop processing rules when this rule matches.
第22题:
create a trigger
create an application
restart the CRS engine
upload script to repository
configure default session timeout
第23题:
Configure a location group
Createan authentication protocol set
Configure the RADIUS AV pair list
Configure RADIUS clients
Configure role and role-mapping rules
第24题:
Username
LDAP user
Certificate
Custom expressions
Source y IP