niusouti.com

多选题Which three JUNOS software features allow for increased security on your network?()Afirewall filtersBdata encryptionCrouting protocol authenticationDsupport for BGP path mtu discoveryEautomatic discovery for IPSEC neighbors

题目
多选题
Which three JUNOS software features allow for increased security on your network?()
A

firewall filters

B

data encryption

C

routing protocol authentication

D

support for BGP path mtu discovery

E

automatic discovery for IPSEC neighbors


相似考题
参考答案和解析
正确答案: E,B
解析: 暂无解析
更多“多选题Which three JUNOS software features allow for increased security on your network?()Afirewall filtersBdata encryptionCrouting protocol authenticationDsupport for BGP path mtu discoveryEautomatic discovery for IPSEC neighbors”相关问题
  • 第1题:

    IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

    • A、IKE keepalives are unidirectional and sent every ten seconds
    • B、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
    • C、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
    • D、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

    正确答案:A,C,D

  • 第2题:

    Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()

    • A、MAC address
    • B、DNS server
    • C、DHCP server
    • D、resolve address
    • E、endpoint address

    正确答案:B,D,E

  • 第3题:

    Which IOS features are used to avoid Routing loops when dynamic Routing protocols are used betweenPE and CE in MPLS-VPN networks?()

    • A、Site Of Origin SOO.
    • B、SHAM links with OSPF
    • C、BGP cost community
    • D、BGP feature allow-as in
    • E、RPF Reverse Path forwarding.
    • F、Access-list Control in Distance Vector protocol like RIP and EIGRP.

    正确答案:A,F

  • 第4题:

    Which BGP attribute is considered first as a tie-breaker in JUNOS software?()

    • A、origin
    • B、weight
    • C、as-path length
    • D、local-preference

    正确答案:D

  • 第5题:

    Which three JUNOS software features allow for increased security on your network?()

    • A、firewall filters
    • B、data encryption
    • C、routing protocol authentication
    • D、support for BGP path mtu discovery
    • E、automatic discovery for IPSEC neighbors

    正确答案:A,B,C

  • 第6题:

    In JUNOS software, which three routing protocols can be used to route IPv6?()

    • A、IS-IS
    • B、Static
    • C、RIPv2
    • D、OSPFv2
    • E、MP-BGP

    正确答案:A,B,E

  • 第7题:

    Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()

    • A、MPLS LSP
    • B、ATM tunnel
    • C、GRE tunnel
    • D、IPSEC tunnel
    • E、L2TPv3 session

    正确答案:A,C,D

  • 第8题:

    多选题
    Which three commands allow you to verify the current state of your BGP neighbors?()
    A

    show bgp group

    B

    show bgp status

    C

    show bgp summary

    D

    show bgp neighbor

    E

    show protocols bgp


    正确答案: B,A
    解析: 暂无解析

  • 第9题:

    单选题
    Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?()
    A

    TestKingB> telnet

    B

    TestKingB > ping

    C

    TestKingB > trace

    D

    TestKingB > show ip route

    E

    TestKingB > show interface

    F

    TestKingB > show cdp neighbors


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    In JUNOS software, which three routing protocols can be used to route IPv6?()
    A

    IS-IS

    B

    Static

    C

    RIPv2

    D

    OSPFv2

    E

    MP-BGP


    正确答案: C,E
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement accurately describes firewall user authentication?()
    A

    Firewall user authentication provides another layer of security in a network.

    B

    Firewall user authentication provides a means for accessing a JUNOS Software-based security device.

    C

    Firewall user authentication enables session-based forwarding.

    D

    Firewall user authentication is used as a last resort security method in a network.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    Which three statements are true regarding IDP?()
    A

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP inspects traffic up to the Application layer.

    C

    IDP searches the data stream for specific attack patterns.

    D

    IDP inspects traffic up to the Presentation layer.

    E

    IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    Which three statements are true regarding IDP?()

    • A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
    • B、IDP inspects traffic up to the Application layer.
    • C、IDP searches the data stream for specific attack patterns.
    • D、IDP inspects traffic up to the Presentation layer.
    • E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

    正确答案:B,C,E

  • 第14题:

    Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?()

    • A、TestKingB> telnet
    • B、TestKingB > ping
    • C、TestKingB > trace
    • D、TestKingB > show ip route
    • E、TestKingB > show interface
    • F、TestKingB > show cdp neighbors

    正确答案:C

  • 第15题:

    Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()

    • A、Network management
    • B、Protocol analyzer
    • C、Network monitoring
    • D、System diagnostic

    正确答案:A

  • 第16题:

    Which BGP attribute is considered first as a tie-breaker in JUNOS software?()

    • A、MED
    • B、origin
    • C、weight
    • D、as-path length
    • E、local-preference

    正确答案:E

  • 第17题:

    Which two statements are true regarding IDP?()

    • A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
    • B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
    • C、IDP inspects traffic up to the Presentation layer.
    • D、IDP inspects traffic up to the Application layer.

    正确答案:A,D

  • 第18题:

    Which three commands allow you to verify the current state of your BGP neighbors?()

    • A、show bgp group
    • B、show bgp status
    • C、show bgp summary
    • D、show bgp neighbor
    • E、show protocols bgp

    正确答案:A,C,D

  • 第19题:

    多选题
    Which three functions are provided by JUNOS Software for security platforms?()
    A

    VPN establishment

    B

    stateful ARP lookups

    C

    Dynamic ARP inspection

    D

    Network Address Translation

    E

    inspection of packets at higher levels (Layer 4 and above)


    正确答案: E,C
    解析: 暂无解析

  • 第20题:

    多选题
    Which three of the following network features are methods used to achieve high availability()
    A

    Spanning Tree Protocol(STP)

    B

    Delay reduction

    C

    Hot Standby Routing Protocol(HSRP)

    D

    Dynamic routing protocols

    E

    Quality of Service(QoS)

    F

    Jitter management


    正确答案: A,C,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true regarding IDP?()
    A

    IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.

    C

    IDP inspects traffic up to the Presentation layer.

    D

    IDP inspects traffic up to the Application layer.


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    多选题
    Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()
    A

    MAC address

    B

    DNS server

    C

    DHCP server

    D

    resolve address

    E

    endpoint address


    正确答案: D,E
    解析: 暂无解析

  • 第23题:

    多选题
    IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
    A

    IKE keepalives are unidirectional and sent every ten seconds

    B

    IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys

    C

    To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets

    D

    IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers


    正确答案: D,B
    解析: 暂无解析