RSH
HTTPS
console
J-Config
第1题:
Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise.Which of the following is most likely to be useful on the branch router?()
A. IPsec tunnel
B. GRE tunnel
C. Floating stati c route
D. An IGP
第2题:
Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise. Which of the following is most likely to be useful on the branch router?()
第3题:
On a Juniper router,what is the default file used for syslog messages?()
第4题:
How many committed configuration files are stored on the Juniper Networks enterprise router?()
第5题:
What are two valid initial configuration methods supported on Juniper routers?()
第6题:
4
15
48
50
第7题:
RSH
HTTPS
console
J-Config
第8题:
null password
simple password
message digest 5
Password Authentication Protocol
Challenge Handshake Authentication Protocol
第9题:
CLI
J-Web
JUNOScope
PCMCIA flash card
第10题:
MBGP
RIB groups
Routing policy
Firewall filters
第11题:
File system snapshots
Mysqldumpslow
Mysqlhotcopy
Mysqldump with – binary-data option
Mysql Enterprise Backup
第12题:
IPsec tunnel
GRE tunnel
Floating stati c route
An IGP
第13题:
What methods are available to create separate multicast and unicast forwarding topologies on a Juniper Networks router?()
第14题:
What are two methods of accessing a Juniper enterprise router?()
第15题:
Which two statements regarding system logging on a Juniper enterprise router are correct?()
第16题:
What are three methods for managing a Juniper Enterprise Router?()
第17题:
In a PPP over ATM environment,which two PPP authentication methods are supported by the ERX Edge Router?()
第18题:
CU
SDX
SAP
J-Web
J-Config
第19题:
urlhash
backup chaining
least connections
fewest outstanding requests
第20题:
UniDirectional Link Detection
Hot Standby Router Protocol
Virtual Router Redundancy Protocol
PortFast
root guard
loop guard
第21题:
15
18
150
165
第22题:
IKE
PAP
CHAP
MSCHAP
第23题:
The system log has a proprietary format.
System logs must be sent to a remote device.
New system logs can be created and archived.
Most software processes create their own logs.
第24题:
10
15
18
150
160
165