niusouti.com

单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()AThe traffic will be rejectedBThe traffic will be droppedCThe traffic will be forwardedDThe traffic will be policed

题目
单选题
Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()
A

The traffic will be rejected

B

The traffic will be dropped

C

The traffic will be forwarded

D

The traffic will be policed


相似考题
参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejectedB The traffic will be droppedC The traffic will be forwardedD The traffic will be policed”相关问题
  • 第1题:

    Which two tasks are accomplished by the firewall filter shown in the exhibit?()

    A. Traffic matching the my-policy term will be counted and accepted.

    B. Traffic matching the my-policy term will be counted and discarded.

    C. Traffic not matching the my-policy term will be discarded.

    D. Traffic not matching the my-policy term will be accepted.


    参考答案:A, C

  • 第2题:

    What are two examples of RE exception traffic?()

    A. BGP updates that travel through the local router and are destined for a remote router.

    B. OSPF hello packets that are sent from a remote router and are destined for the local router.

    C. Telnet traffic that is sent from a remote host and is destined for the local router.

    D. Telnet traffic that travels through the local router and is destined for a remote end host.


    参考答案:B, C

  • 第3题:

    The relevant portion of the Barrymore router configuration is displayed below:In your effort to conserve precious bandwidth, you set up some ACL‘s to deny internet access to the remote server located at 192.168.20.5. A few minutes after reconfiguring (as shown in the exhibit above) you notice that some web traffic is still going through.Based on the above output, what do you suspect as to why the traffic still traveling over the ISDN link?()

    A. Broadcasts are creating "interesting" traffic.

    B. The access-list is not configured correctly.

    C. The command ip access-group 129 out is missing from the bri0/0 interface.

    D. The dialer-group has not been applied to outbound traffic.


    参考答案:B

  • 第4题:

    ______ is not likely to be a methods of Traffic Separation.

    A.Separation of opposing streams of traffic by separation zones or lines

    B.The separation of through traffic from local traffic by provision of inshore traffic zones

    C.Division of traffic from several different direction into sectors

    D.Control of routing traffic through shipping routes


    正确答案:D

  • 第5题:

    Which statement describes the behavior of a security policy?()

    • A、The implicit default security policy permits all traffic.
    • B、Traffic destined to the device itself always requires a security policy.
    • C、Traffic destined to the device’s incoming interface does not require a security policy.
    • D、The factory-default configuration permits all traffic from all interfaces.

    正确答案:C

  • 第6题:

    What are two examples of RE exception traffic?()

    • A、BGP updates that travel through the local router and are destined for a remote router.
    • B、OSPF hello packets that are sent from a remote router and are destined for the local router.
    • C、Telnet traffic that is sent from a remote host and is destined for the local router.
    • D、Telnet traffic that travels through the local router and is destined for a remote end host.

    正确答案:B,C

  • 第7题:

    Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.

    • A、DNS traffic is denied.
    • B、Telnet traffic is denied.
    • C、SMTP traffic is denied.
    • D、Ping traffic is permitted

    正确答案:B

  • 第8题:

    You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()

    • A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
    • B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.
    • C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
    • D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

    正确答案:B

  • 第9题:

    单选题
    Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.
    A

    DNS traffic is denied.

    B

    Telnet traffic is denied.

    C

    SMTP traffic is denied.

    D

    Ping traffic is permitted


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
    A

    Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.

    B

    Allow all inbound VPN traffic to pass through the perimeter firewall only.  

    C

    Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.

    D

    Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    How will the above access lists affect traffic?()
    A

    FTP traffic from 192.169.1.22 will be denied

    B

    No traffic, except for FTP traffic will be allowed to exit E0

    C

    FTP traffic from 192.169.1.9 to any host will be denied

    D

    All traffic exiting E0 will be denied

    E

    All FTP traffic to network 192.169.1.9/29 will be denied


    正确答案: E
    解析: 暂无解析

  • 第12题:

    单选题
    Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()
    A

    The traffic will be rejected.

    B

    The traffic will be dropped.

    C

    The traffic will be forwarded.

    D

    The traffic will be policed.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? ()

    A. inbound traffic transiting the router

    B. outbound traffic transiting the router

    C. traffic destined to the Routing Engine

    D. traffic destined to the interface address on which the filter is applied


    参考答案:A, C, D

  • 第14题:

    Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()

    A.Traffic that does not match any route in the forwarding table.

    B.Traffic that exceeds the bandwidth of the interface.

    C.Traffic of unsupported protocols on that interface.

    D.Traffic arriving on unknown virtual-circuits on that interface.


    参考答案:C

  • 第15题:

    Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for 172.16.12.10 if the traffic is processed by this ACL?()

    A.Traffic will be dropped per line 30 of the ACL.

    B.Traffic will be accepted per line 40 of the ACL.

    C.Traffic will be dropped, because of the implicit deny all at the end of the ACL.

    D.Traffic will be accepted, because the source address is not covered by the ACL.


    参考答案:C

  • 第16题:

    Which descriptions of Netflow is correct?()

    • A、By default,Netflow records bidirectional IP traffic flow.
    • B、Netflow answers questions regarding IP traffic:who,what,where,when,and how
    • C、Netflow accounts for both transit traffic and traffic destined for the router.
    • D、Netflow returns the subinterface information in the flow records.

    正确答案:B,C,D

  • 第17题:

    What statement about Transit AS is true?()

    • A、Traffic and prefixes originating from Source AS are carried across a Transit AS to reach theirdestination AS
    • B、Traffic and prefixes originating from Transit AS are carried across a Stub AS to their destination AS
    • C、Traffic and prefixes originating from Transit AS are carried across a Stub AS to their Source AS
    • D、None of the above

    正确答案:A

  • 第18题:

    A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? ()

    • A、inbound traffic transiting the router
    • B、outbound traffic transiting the router
    • C、traffic destined to the Routing Engine
    • D、traffic destined to the interface address on which the filter is applied

    正确答案:A,C,D

  • 第19题:

    Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()

    • A、Traffic that does not match any route in the forwarding table.
    • B、Traffic that exceeds the bandwidth of the interface.
    • C、Traffic of unsupported protocols on that interface.
    • D、Traffic arriving on unknown virtual-circuits on that interface.

    正确答案:C

  • 第20题:

    单选题
    Based on the configuration shown in the exhibit, what will happen to the traffic matching the security policy?()
    A

    The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.

    B

    The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.

    C

    The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.

    D

    The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    多选题
    A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? ()
    A

    inbound traffic transiting the router

    B

    outbound traffic transiting the router

    C

    traffic destined to the Routing Engine

    D

    traffic destined to the interface address on which the filter is applied


    正确答案: D,B
    解析: 暂无解析

  • 第22题:

    单选题
    () is not likely to be a methods of Traffic Separation.
    A

    Separation of opposing streams of traffic by separation zones or lines

    B

    The separation of through traffic from local traffic by provision of inshore traffic zones

    C

    Division of traffic from several different direction into sectors

    D

    Control of routing traffic through shipping routes


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which descriptions of Netflow is correct?()
    A

    By default,Netflow records bidirectional IP traffic flow.

    B

    Netflow answers questions regarding IP traffic:who,what,where,when,and how

    C

    Netflow accounts for both transit traffic and traffic destined for the router.

    D

    Netflow returns the subinterface information in the flow records.


    正确答案: A,C
    解析: 暂无解析