niusouti.com

多选题Which two statements are true when source/destination filters are enabled? ()(Choose two.)AExcluded traffic is not accelerated.BExcluded traffic is only compressed.CSource/destination filter applies to all traffic sent from LAN to WAN.DSource/destinati

题目
多选题
Which two statements are true when source/destination filters are enabled? ()(Choose two.)
A

Excluded traffic is not accelerated.

B

Excluded traffic is only compressed.

C

Source/destination filter applies to all traffic sent from LAN to WAN.

D

Source/destination filters work in packet interception mode using RIPv2.


相似考题
更多“多选题Which two statements are true when source/destination filters are enabled? ()(Choose two.)AExcluded traffic is not accelerated.BExcluded traffic is only compressed.CSource/destination filter applies to all traffic sent from LAN to WAN.DSource/destinati”相关问题
  • 第1题:

    Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4 (Choose two.)()。

    • A、It establishes a static route to the 172.16.3.0 network
    • B、It establishes a static route to the 192.168.2.0 network
    • C、It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network
    • D、It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4
    • E、It uses the default administrative distance
    • F、It is a route that would be used last if other routes to the same destination exist

    正确答案:A,E

  • 第2题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第3题:

    Which location will be recommended for extended or extended named ACLs?()

    • A、when using the established keyword,a location close to the destination point to ensure that return trafficis allowed
    • B、an intermediate location to filter as much traffic as possible ActualTests.com
    • C、a location as close to the source traffic as possible
    • D、a location as close to the destination traffic as possible

    正确答案:C

  • 第4题:

    Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }

    • A、DNS traffic is denied.
    • B、HTTP traffic is denied.
    • C、FTP traffic is permitted.
    • D、SMTP traffic is permitted.

    正确答案:A,C

  • 第5题:

    Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose  three.)()  

    • A、 The CoS value is trusted for 802.1p or 802.1q tagged traffic.
    • B、 The voice VLAN feature is disabled by default.
    • C、 The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
    • D、 When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port.
    • E、 PortFast is automatically disabled when a voice VLAN is configured.
    • F、 The default CoS value for incoming traffic is set to 0.

    正确答案:B,D,F

  • 第6题:

    What statement about Transit AS is true?()

    • A、Traffic and prefixes originating from Source AS are carried across a Transit AS to reach theirdestination AS
    • B、Traffic and prefixes originating from Transit AS are carried across a Stub AS to their destination AS
    • C、Traffic and prefixes originating from Transit AS are carried across a Stub AS to their Source AS
    • D、None of the above

    正确答案:A

  • 第7题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    • A、Traffic is permitted from the trust zone to the untrust zone.
    • B、Intrazone traffic in the trust zone is permitted.
    • C、All traffic through the device is denied.
    • D、The policy is matched only when no other matching policies are found.

    正确答案:C,D

  • 第8题:

    多选题
    Click the Exhibit button.Which two are correct about CIFS acceleration based on the exhibit?() (Choose two.)
    A

    The statistics show savings for all CIFS traffic.

    B

    The traffic transfered over 4,000 seconds faster.

    C

    There was a bandwidth savings of almost 68.9%.

    D

    The acceleration is only working for 68.9% of the traffic


    正确答案: A,B
    解析: 暂无解析

  • 第9题:

    多选题
    Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
    A

    DNS traffic is denied.

    B

    HTTP traffic is denied.

    C

    FTP traffic is permitted.

    D

    SMTP traffic is permitted.


    正确答案: C,B
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true when source/destination filters are enabled? ()(Choose two.)
    A

    Excluded traffic is not accelerated.

    B

    Excluded traffic is only compressed.

    C

    Source/destination filter applies to all traffic sent from LAN to WAN.

    D

    Source/destination filters work in packet interception mode using RIPv2.


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements about an IDS are true?()
    A

    The IDS is in the traffic path.

    B

    The IDS can send TCP resets to the source device.

    C

    The IDS can send TCP resets to the destination device.

    D

    The IDS listens promiscuously to all traffic on the network.

    E

    Default operation is for the IDS to discard malicious traffic.


    正确答案: E,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()
    A

    It establishes a static route to the 172.16.3.0 network.

    B

    It establishes a static route to the 192.168.2.0 network.

    C

    It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.

    D

    It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.

    E

    It uses the default administrative distance.

    F

    It is a route that would be used last if other routes to the same destination exist.


    正确答案: E,C
    解析: 暂无解析

  • 第13题:

    Which two statements about an IDS are true?()

    • A、The IDS is in the traffic path.
    • B、The IDS can send TCP resets to the source device.
    • C、The IDS can send TCP resets to the destination device.
    • D、The IDS listens promiscuously to all traffic on the network.
    • E、Default operation is for the IDS to discard malicious traffic.

    正确答案:B,D

  • 第14题:

    Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()

    • A、It establishes a static route to the 172.16.3.0 network.
    • B、It establishes a static route to the 192.168.2.0 network.
    • C、It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
    • D、It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
    • E、It uses the default administrative distance.
    • F、It is a route that would be used last if other routes to the same destination exist.

    正确答案:A,E

  • 第15题:

    Which two statements are true about L2TP tunnels?() (Choose two.)

    • A、Traffic is clear text
    • B、Traffic is encrypted 
    • C、They are initiated by the LNS
    • D、They are initiated by the LAC

    正确答案:A,D

  • 第16题:

    Which two statements are true when source/destination filters are enabled? ()(Choose two.)

    • A、Excluded traffic is not accelerated.
    • B、Excluded traffic is only compressed.
    • C、Source/destination filter applies to all traffic sent from LAN to WAN.
    • D、Source/destination filters work in packet interception mode using RIPv2.

    正确答案:A,C

  • 第17题:

    Which two statements are true about network voice traffic? (Choose two.)()

    • A、 Voice traffic is affected more by link speed than FTP traffic is.
    • B、 Voice traffic is affected more by packet delays than FTP traffic is.
    • C、 Voice streams involve larger packet sizes than most TCP network traffic involves.
    • D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.
    • E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

    正确答案:B,D

  • 第18题:

    Which two statements are true for a security policy? ()(Choose two.)

    • A、It controls inter-zone traffic.
    • B、It controls intra-zone traffic.
    • C、It is named with a system-defined name.
    • D、It controls traffic destined to the device's ingress interface.

    正确答案:A,B

  • 第19题:

    多选题
    Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4 (Choose two.)()。
    A

    It establishes a static route to the 172.16.3.0 network

    B

    It establishes a static route to the 192.168.2.0 network

    C

    It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network

    D

    It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4

    E

    It uses the default administrative distance

    F

    It is a route that would be used last if other routes to the same destination exist


    正确答案: C,A
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true about network voice traffic? (Choose two.)()
    A

    Voice traffic is affected more by link speed than FTP traffic is.

    B

    Voice traffic is affected more by packet delays than FTP traffic is.

    C

    Voice streams involve larger packet sizes than most TCP network traffic involves.

    D

    Voice traffic is more sensitive to packet loss than TCP network traffic is.

    E

    Voice traffic requires QOS mechanisms only in heavily loaded network segments.


    正确答案: A,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true for a security policy? ()(Choose two.)
    A

    It controls inter-zone traffic.

    B

    It controls intra-zone traffic.

    C

    It is named with a system-defined name.

    D

    It controls traffic destined to the device's ingress interface.


    正确答案: D,A
    解析: 暂无解析

  • 第22题:

    单选题
    Which location will be recommended for extended or extended named ACLs?()
    A

    when using the established keyword,a location close to the destination point to ensure that return trafficis allowed

    B

    an intermediate location to filter as much traffic as possible ActualTests.com

    C

    a location as close to the source traffic as possible

    D

    a location as close to the destination traffic as possible


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    What are two reasons that a network administrator would use access lists (Choose two.)()。
    A

    to control vty access into a router

    B

    to control broadcast traffic through a router

    C

    to filter traffic as it passes through a router

    D

    to filter traffic that originates from the router

    E

    to replace passwords as a line of defense against security incursions


    正确答案: B,C
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
    A

    Traffic is permitted from the trust zone to the untrust zone.

    B

    Intrazone traffic in the trust zone is permitted.

    C

    All traffic through the device is denied.

    D

    The policy is matched only when no other matching policies are found.


    正确答案: C,A
    解析: 暂无解析