网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
Which three ports does a WX device use for control traffic purposes?() (Choose three.)
A
3577 UDP
B
3578 UDP
C
3678 UDP
D
3577 TCP
E
3578 TCP
参考答案
参考解析
解析:
暂无解析
更多 “多选题Which three ports does a WX device use for control traffic purposes?() (Choose three.)A3577 UDPB3578 UDPC3678 UDPD3577 TCPE3578 TCP” 相关考题
考题
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
A. pingB. FTPC. TelnetD. HTTPE. HTTPS
考题
Which three RIP features are supported on the WX or WXC device? ()(Choose three.)
A. SHA-1B. MD5 authenticationC. version 1 messagesD. version 2 messagesE. plain-text authentication
考题
Which three ports does a WX device use for control traffic purposes?() (Choose three.)
A. 3577 UDPB. 3578 UDPC. 3678 UDPD. 3577 TCPE. 3578 TCP
考题
Which type of lock must be granted for the WX device to perform write acceleration on CIFS traffic?()
A. oplockB. block lockC. bit range lockD. byte range lock
考题
Which database does WX Central Management System (WX CMS) software use to store historical data?()
A. OracleB. MySQLC. SybaseD. Microsoft Access
考题
Which two conditions will cause switch-to-wire to occur? ()(Choose two.)
A. loss of powerB. QoS congestionC. software failure occuredD. WX device exceeded its license speedE. traffic does not match application definiton
考题
Which three methods can you use for route discovery on a WX platform? ()(Choose three.)
A. Enable RIPB. Enable OSPFC. Periodically poll any routerD. Import routes from a TFTP server
考题
Which three QoS mechanisms can be configured to improve VoIP quality on a converged network?()A、The use of a queuing method that will give VoIP traffic strict priority over other traffic B、The use of RTP header compression for the VoIP traffic.C、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED for the VoIP traffic
考题
Which three statistics does the Executive report summarize?() (Choose three.)A、latency and lossB、compression resultsC、traffic (by application)D、CRC and alignment errorsE、user access (by username)
考题
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)A、pingB、FTPC、TelnetD、HTTPE、HTTPS
考题
Which three ports does a WX device use for control traffic purposes?() (Choose three.)A、3577 UDPB、3578 UDPC、3678 UDPD、3577 TCPE、3578 TCP
考题
Which two conditions will cause switch-to-wire to occur? ()(Choose two.)A、loss of powerB、QoS congestionC、software failure occuredD、WX device exceeded its license speedE、traffic does not match application definiton
考题
Which three RIP features are supported on the WX or WXC device? ()(Choose three.)A、SHA-1B、MD5 authenticationC、version 1 messagesD、version 2 messagesE、plain-text authentication
考题
Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)A、Fast Connection SetupB、TCP Acceleration (AFP)C、Network Sequence CachingD、AppFlow's MAPI accelerationE、Molecular Sequence Reduction
考题
Which three components does the Scheduler use for managing tasks within the Oracle environment? ()(Choose three.)A、a jobB、a programC、a scheduleD、a PL/SQL procedure
考题
多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS
考题
多选题Which three RIP features are supported on the WX or WXC device? ()(Choose three.)ASHA-1BMD5 authenticationCversion 1 messagesDversion 2 messagesEplain-text authentication
考题
多选题Which three methods can you use for route discovery on a WX platform? ()(Choose three.)AEnable RIPBEnable OSPFCPeriodically poll any routerDImport routes from a TFTP server
考题
单选题Which database does WX Central Management System (WX CMS) software use to store historical data?()A
OracleB
MySQLC
SybaseD
Microsoft Access
考题
多选题Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)AFast Connection SetupBTCP Acceleration (AFP)CNetwork Sequence CachingDAppFlow's MAPI accelerationEMolecular Sequence Reduction
考题
多选题Which two statements are correct about firewall filters in the Junos OS?()AFirewall filters are stateless.BFirewall filters are used to control routing information that is exchanged between devices.CFirewall filters are used to control traffic passing through the device.DFirewall filters can only be applied to traffic entering the device.
考题
单选题Which type of lock must be granted for the WX device to perform write acceleration on CIFS traffic?()A
oplockB
block lockC
bit range lockD
byte range lock
考题
多选题Which three benefits does WX Central Management System (WX CMS) software offer WX administrators?()(Choose three.)ASupports up to 1500 WX devices.BSimplifies software deployment of WX devices.CProvides a scheduler for device management tasks.DSupport is offered for both UNIX- and Windows-based products.EProvides views of the immediate status of deployed devices and the service tunnels.
考题
单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A
All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB
Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC
All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD
All traffic is flooded out all ports and an attacker is able to capture all dataE
None of the other alternatives apply
考题
单选题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A
You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B
No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C
You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D
You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.
热门标签
最新试卷