The traffic will be rejected
The traffic will be dropped
The traffic will be forwarded
The traffic will be policed
第1题:
A. Traffic matching the my-policy term will be counted and accepted.
B. Traffic matching the my-policy term will be counted and discarded.
C. Traffic not matching the my-policy term will be discarded.
D. Traffic not matching the my-policy term will be accepted.
第2题:
A. BGP updates that travel through the local router and are destined for a remote router.
B. OSPF hello packets that are sent from a remote router and are destined for the local router.
C. Telnet traffic that is sent from a remote host and is destined for the local router.
D. Telnet traffic that travels through the local router and is destined for a remote end host.
第3题:
The relevant portion of the Barrymore router configuration is displayed below:In your effort to conserve precious bandwidth, you set up some ACL‘s to deny internet access to the remote server located at 192.168.20.5. A few minutes after reconfiguring (as shown in the exhibit above) you notice that some web traffic is still going through.Based on the above output, what do you suspect as to why the traffic still traveling over the ISDN link?()
A. Broadcasts are creating "interesting" traffic.
B. The access-list is not configured correctly.
C. The command ip access-group 129 out is missing from the bri0/0 interface.
D. The dialer-group has not been applied to outbound traffic.
第4题:
______ is not likely to be a methods of Traffic Separation.
A.Separation of opposing streams of traffic by separation zones or lines
B.The separation of through traffic from local traffic by provision of inshore traffic zones
C.Division of traffic from several different direction into sectors
D.Control of routing traffic through shipping routes
第5题:
Which statement describes the behavior of a security policy?()
第6题:
What are two examples of RE exception traffic?()
第7题:
Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.
第8题:
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
第9题:
DNS traffic is denied.
Telnet traffic is denied.
SMTP traffic is denied.
Ping traffic is permitted
第10题:
Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
Allow all inbound VPN traffic to pass through the perimeter firewall only.
Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
第11题:
FTP traffic from 192.169.1.22 will be denied
No traffic, except for FTP traffic will be allowed to exit E0
FTP traffic from 192.169.1.9 to any host will be denied
All traffic exiting E0 will be denied
All FTP traffic to network 192.169.1.9/29 will be denied
第12题:
The traffic will be rejected.
The traffic will be dropped.
The traffic will be forwarded.
The traffic will be policed.
第13题:
A. inbound traffic transiting the router
B. outbound traffic transiting the router
C. traffic destined to the Routing Engine
D. traffic destined to the interface address on which the filter is applied
第14题:
A.Traffic that does not match any route in the forwarding table.
B.Traffic that exceeds the bandwidth of the interface.
C.Traffic of unsupported protocols on that interface.
D.Traffic arriving on unknown virtual-circuits on that interface.
第15题:
A.Traffic will be dropped per line 30 of the ACL.
B.Traffic will be accepted per line 40 of the ACL.
C.Traffic will be dropped, because of the implicit deny all at the end of the ACL.
D.Traffic will be accepted, because the source address is not covered by the ACL.
第16题:
Which descriptions of Netflow is correct?()
第17题:
What statement about Transit AS is true?()
第18题:
A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? ()
第19题:
Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()
第20题:
The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.
The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.
The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.
The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.
第21题:
inbound traffic transiting the router
outbound traffic transiting the router
traffic destined to the Routing Engine
traffic destined to the interface address on which the filter is applied
第22题:
Separation of opposing streams of traffic by separation zones or lines
The separation of through traffic from local traffic by provision of inshore traffic zones
Division of traffic from several different direction into sectors
Control of routing traffic through shipping routes
第23题:
By default,Netflow records bidirectional IP traffic flow.
Netflow answers questions regarding IP traffic:who,what,where,when,and how
Netflow accounts for both transit traffic and traffic destined for the router.
Netflow returns the subinterface information in the flow records.