网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which three functions are available under the "Maintain" tab of J-Web?()
- A、download and delete log files
- B、view real-time statistics of interfaces
- C、reboot the system
- D、view and add licenses
- E、edit security settings
参考答案
更多 “Which three functions are available under the "Maintain" tab of J-Web?()A、download and delete log filesB、view real-time statistics of interfacesC、reboot the systemD、view and add licensesE、edit security settings” 相关考题
考题
Which two design goals describe the Junos OS design?()A、clean separation of security and routing policiesB、clean separation of control and forwarding planesC、modularization of multiple software processesD、a single hardware platform for all software applications
考题
Which route filter match type only matches prefixes greater than the defined prefix?()A、exactB、uptoC、longerD、orlonger
考题
What must be configured prior to the first commit after factory defaults are loaded?()A、root authenticationB、default gatewayC、host nameD、management services
考题
In the output of show isis adjacency, what are three valid items that can be displayed under the attributes header?()A、IS typeB、attachedC、overloadD、area addresses
考题
Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()A、username="*" - Employee-role Stop username="con-*" - Contractor-roleB、username="*" - Employee-role username="con-*" - Contractor-role StopC、username="con-*" - Contractor-role Stop username="*" - Employee-roleD、username="con-*" - Contractor-role username="*" - Employee-role Stop
考题
Which statement describes a security zone?()A、A security zone can contain one or more interfaces.B、A security zone can contain interfaces in multiple routing instances.C、A security zone must contain two or more interfaces.D、A security zone must contain bridge groups.
考题
Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when performing Layer 2 enforcement?()A、EAPB、RADIUSC、SSLD、EAP-o-HTTP
热门标签
最新试卷