网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which two statements are true when source/destination filters are enabled? ()(Choose two.)
- A、Excluded traffic is not accelerated.
- B、Excluded traffic is only compressed.
- C、Source/destination filter applies to all traffic sent from LAN to WAN.
- D、Source/destination filters work in packet interception mode using RIPv2.
参考答案
更多 “Which two statements are true when source/destination filters are enabled? ()(Choose two.)A、Excluded traffic is not accelerated.B、Excluded traffic is only compressed.C、Source/destination filter applies to all traffic sent from LAN to WAN.D、Source/destination filters work in packet interception mode using RIPv2.” 相关考题
考题
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.
考题
Which two statements are true when source/destination filters are enabled? ()(Choose two.)
A. Excluded traffic is not accelerated.B. Excluded traffic is only compressed.C. Source/destination filter applies to all traffic sent from LAN to WAN.D. Source/destination filters work in packet interception mode using RIPv2.
考题
What are some general guidelines regarding the placement of access control lists?()
A. You should place standard ACLS as close as possible to the source of traffic to be denied.B. You should place extended ACLS as close as possible to the source of traffic to be denied.C. You should place standard ACLS as close as possible to the destination of traffic to be denied.D. You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
考题
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address
考题
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4 (Choose two.)()。
A.It establishes a static route to the 172.16.3.0 networkB.It establishes a static route to the 192.168.2.0 networkC.It configures the router to send any traffic for an unknown destination to the 172.16.3.0 networkD.It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4E.It uses the default administrative distanceF.It is a route that would be used last if other routes to the same destination exist
考题
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4 (Choose two.)()。A、It establishes a static route to the 172.16.3.0 networkB、It establishes a static route to the 192.168.2.0 networkC、It configures the router to send any traffic for an unknown destination to the 172.16.3.0 networkD、It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4E、It uses the default administrative distanceF、It is a route that would be used last if other routes to the same destination exist
考题
Which two statements best describe Cisco IOS IP SLA?()A、only implemented between Cisco source and destination-capable devicesB、statistics provided by syslog, CLI, and SNMPC、measures delay, jitter, packet loss, and voice qualityD、only monitors VoIP traffic flowsE、provides active monitoringF、provides passive monitoring
考题
Which two statements about an IDS are true?()A、The IDS is in the traffic path.B、The IDS can send TCP resets to the source device.C、The IDS can send TCP resets to the destination device.D、The IDS listens promiscuously to all traffic on the network.E、Default operation is for the IDS to discard malicious traffic.
考题
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()A、It establishes a static route to the 172.16.3.0 network.B、It establishes a static route to the 192.168.2.0 network.C、It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.D、It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.E、It uses the default administrative distance.F、It is a route that would be used last if other routes to the same destination exist.
考题
You work as a network technician at Company. Your boss, Mrs., is interested in LWAPP (Lightweight Access Point Protocol). What should you tell her regarding this technology? ()A、 LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted.B、 Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.C、 Layer 3 LWAPP is a UDP/IP Frame that requires a Cisco Aironet AP to obtain an IP address using DHCP.D、 Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.E、 Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.F、 Data traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
考题
Which location will be recommended for extended or extended named ACLs?()A、when using the established keyword,a location close to the destination point to ensure that return trafficis allowedB、an intermediate location to filter as much traffic as possible ActualTests.comC、a location as close to the source traffic as possibleD、a location as close to the destination traffic as possible
考题
Which three characteristics of the traffic flow are taken into consideration when the QoS-for-VPNs feature (QoS pre-classify) provides packet classification and applies appropriate QoS service on tunnel interfaces?()A、IP precedence bitsB、DSCP bitsC、original port numbersD、DE bitsE、source IP addressF、destination IP address
考题
Which of the following statements are true concerning the command ip sla monitor responder typetcpconnect ipaddress 10.1.1.1 port 23?(Choose all that apply.)()A、The command will initiate a probe with a destination IP address of 10.1.1.1B、The command is used on the IP SLA responder and the IP SLA sourceC、The command will allow only source address 10.1.1.1 to source probesD、The command will initiate a probe with a destination Telnet portE、The command is used to make the router a responderF、The command will initiate a probe with a source port of 23
考题
Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC
考题
Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }A、DNS traffic is denied.B、HTTP traffic is denied.C、FTP traffic is permitted.D、SMTP traffic is permitted.
考题
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address
考题
What statement about Transit AS is true?()A、Traffic and prefixes originating from Source AS are carried across a Transit AS to reach theirdestination ASB、Traffic and prefixes originating from Transit AS are carried across a Stub AS to their destination ASC、Traffic and prefixes originating from Transit AS are carried across a Stub AS to their Source ASD、None of the above
考题
Which statement is true about source NAT?()A、Source NAT works only with source pools.B、Destination NAT is required to translate the reply traffic.C、Source NAT does not require a security policy to function.D、The egress interface IP address can be used for source NAT
考题
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.
考题
Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)A、Addresses used for NAT pools should never overlap.B、If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.C、If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.D、Dynamic source NAT rules take precedence over static source NAT rules.
考题
Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.A、DNS traffic is denied.B、Telnet traffic is denied.C、SMTP traffic is denied.D、Ping traffic is permitted
考题
多选题Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4 (Choose two.)()。AIt establishes a static route to the 172.16.3.0 networkBIt establishes a static route to the 192.168.2.0 networkCIt configures the router to send any traffic for an unknown destination to the 172.16.3.0 networkDIt configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4EIt uses the default administrative distanceFIt is a route that would be used last if other routes to the same destination exist
考题
多选题Which two statements are true when source/destination filters are enabled? ()(Choose two.)AExcluded traffic is not accelerated.BExcluded traffic is only compressed.CSource/destination filter applies to all traffic sent from LAN to WAN.DSource/destination filters work in packet interception mode using RIPv2.
考题
单选题Which location will be recommended for extended or extended named ACLs?()A
when using the established keyword,a location close to the destination point to ensure that return trafficis allowedB
an intermediate location to filter as much traffic as possible ActualTests.comC
a location as close to the source traffic as possibleD
a location as close to the destination traffic as possible
考题
多选题Which two statements about an IDS are true?()AThe IDS is in the traffic path.BThe IDS can send TCP resets to the source device.CThe IDS can send TCP resets to the destination device.DThe IDS listens promiscuously to all traffic on the network.EDefault operation is for the IDS to discard malicious traffic.
考题
多选题Which of the following statements are true concerning the command ip sla monitor responder typetcpconnect ipaddress 10.1.1.1 port 23?(Choose all that apply.)()AThe command will initiate a probe with a destination IP address of 10.1.1.1BThe command is used on the IP SLA responder and the IP SLA sourceCThe command will allow only source address 10.1.1.1 to source probesDThe command will initiate a probe with a destination Telnet portEThe command is used to make the router a responderFThe command will initiate a probe with a source port of 23
考题
多选题Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)ATraffic is permitted from the trust zone to the untrust zone.BIntrazone traffic in the trust zone is permitted.CAll traffic through the device is denied.DThe policy is matched only when no other matching policies are found.
热门标签
最新试卷