网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)
- A、Addresses used for NAT pools should never overlap.
- B、If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.
- C、If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.
- D、Dynamic source NAT rules take precedence over static source NAT rules.
参考答案
更多 “Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)A、Addresses used for NAT pools should never overlap.B、If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.C、If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.D、Dynamic source NAT rules take precedence over static source NAT rules.” 相关考题
考题
Which two statements are correct about database transportation?() (Choose two.)
A. The source and target platforms must be the sameB. Redo logs, control files and temp files are also transportedC. The transported database must have the same database identifier (DBID) as the source database and cannot be changedD. The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transportedE. Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
考题
Which two statements are true about pool-based source NAT? ()(Choose two.)
A. PAT is not supported.B. PAT is enabled by default.C. It supports the address-persistent configuration option.D. It supports the junos-global configuration option.
考题
Which two statements best describe Cisco IOS IP SLA?()A、only implemented between Cisco source and destination-capable devicesB、statistics provided by syslog, CLI, and SNMPC、measures delay, jitter, packet loss, and voice qualityD、only monitors VoIP traffic flowsE、provides active monitoringF、provides passive monitoring
考题
Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC
考题
Which two statements are correct when you use the reject parameter as the next-hop value for a static route?()A、The packet is dropped and the packet's source is marked with the no-readvertise parameter.B、The system sends the packet back to the source.C、The packet is dropped from the network.D、The system sends an ICMP message back to the source of the packet.
考题
Which two statements are correct about database transportation?() A、 The source and target platforms must be the sameB、 Redo logs,control files and temp files are also transportedC、 The transported database must have the same database identifier (DBID) as the source database and cannot be changedD、 The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transportedE、 Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
考题
Which two statements are true when source/destination filters are enabled? ()(Choose two.)A、Excluded traffic is not accelerated.B、Excluded traffic is only compressed.C、Source/destination filter applies to all traffic sent from LAN to WAN.D、Source/destination filters work in packet interception mode using RIPv2.
考题
Which two statements about RPF checks in Multicast Source Discovery Protocol (MSDP) are true?()A、It prevents message looping, Session Advertisement (SA)messages must be RPF checkedB、RPF check should be done against the route to the source S of the corresponding PIM-SM domainC、RPF check should be done against the route to the Rendez-vous Point of the corresponding PIM-SM domain,which originated the SAD、RPF checking Session Advertisement (SA) messages will cause message looping
考题
In order to configure two routers as anycast RPs,which of these requirements,at a minimum, must be satisfied?()A、Multicast Source Discovery Protocol mesh-groups must be configured between the two anycast RPs.B、The RPs must be within the same IGP domain.C、Multicast Source Discovery Protocol must be configured between the two anycast RPs.D、The two anycast RPs must be IBGP peers.
考题
Which two statements are true about the forwarding table?()A、The forwarding table lists each source protocol and preference for each destinationB、The forwarding table constains only active routesC、The forwarding table is used to process transit packetsD、The forwarding table is stored in compact flash
考题
Which two statements are true about pool-based source NAT? ()(Choose two.)A、PAT is not supported.B、PAT is enabled by default.C、It supports the address-persistent configuration option.D、It supports the junos-global configuration option.
考题
Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)A、rate limiting of ICMPB、RADIUS authorizationsC、source address validationD、stateful firewall on the router
考题
Which is the source used by Automatic SQL Tuning that runs as part of the AUTOTASK framework?()A、 SQL statements that are part of the AWR baseline onlyB、 SQL statements based on the AWR top SQL identificationC、 SQL statements that are part of the available SQL Tuning Set (STS) onlyD、 SQL statements that are available in the cursor cache and executed by a user other than SYS
考题
多选题Which two statements are correct when you use the reject parameter as the next-hop value for a static route?()AThe packet is dropped and the packet's source is marked with the no-readvertise parameter.BThe system sends the packet back to the source.CThe packet is dropped from the network.DThe system sends an ICMP message back to the source of the packet.
考题
多选题Which two statements are correct about database transportation?() (Choose two.)AThe source and target platforms must be the sameBRedo logs, control files and temp files are also transportedCThe transported database must have the same database identifier (DBID) as the source database and cannot be changedDThe COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transportedERecovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
考题
多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC
考题
多选题Which two statements are correct about database transportation? ()AThe source and target platforms must be the sameBRedo logs, control files and temp files are also transportedCThe transported database must have the same database identifier (DBID) as the source database and cannot be changedDThe COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transportedERecovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
考题
多选题Which two locations can be configured as a source for the IOS image in the boot system command?()ARAMBNVRAMCflash memoryDHTTP serverETFTP serverFTelnet server
考题
多选题Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)AAddresses used for NAT pools should never overlap.BIf more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.CIf traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.DDynamic source NAT rules take precedence over static source NAT rules.
考题
多选题Which two statements are true when source/destination filters are enabled? ()(Choose two.)AExcluded traffic is not accelerated.BExcluded traffic is only compressed.CSource/destination filter applies to all traffic sent from LAN to WAN.DSource/destination filters work in packet interception mode using RIPv2.
考题
单选题Which is the source used by Automatic SQL Tuning that runs as part of the AUTOTASK framework?()A
SQL statements that are part of the AWR baseline onlyB
SQL statements based on the AWR top SQL identificationC
SQL statements that are part of the available SQL Tuning Set (STS) onlyD
SQL statements that are available in the cursor cache and executed by a user other than SYS
考题
多选题Which two statements are true about the forwarding table?()AThe forwarding table lists each source protocol and preference for each destination.BThe forwarding table contains only active routes.CThe forwarding table is used to process transit packets.DThe forwarding table is stored in compact flash.
考题
多选题Which two statements are true about the forwarding table?()AThe forwarding table lists each source protocol and preference for each destination.BThe forwarding table contains only active routes.CThe forwarding table is used to process transit packets.DThe forwarding table is stored in compact flash
考题
多选题Which two statements are true about the forwarding table?()AThe forwarding table lists each source protocol and preference for each destinationBThe forwarding table constains only active routesCThe forwarding table is used to process transit packetsDThe forwarding table is stored in compact flash
考题
多选题Which two statements best describe Cisco IOS IP SLA?()Aonly implemented between Cisco source and destination-capable devicesBstatistics provided by syslog, CLI, and SNMPCmeasures delay, jitter, packet loss, and voice qualityDonly monitors VoIP traffic flowsEprovides active monitoringFprovides passive monitoring
考题
多选题Which two statements are true about pool-based source NAT? ()(Choose two.)APAT is not supported.BPAT is enabled by default.CIt supports the address-persistent configuration option.DIt supports the junos-global configuration option.
考题
多选题Which two statements about an IDS are true?()AThe IDS is in the traffic path.BThe IDS can send TCP resets to the source device.CThe IDS can send TCP resets to the destination device.DThe IDS listens promiscuously to all traffic on the network.EDefault operation is for the IDS to discard malicious traffic.
热门标签
最新试卷