网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Under which Junos hierarchy level are security policies configured?()
A. [edit security]
B. [edit protocols]
C. [edit firewall]
D. [edit policy-options]
参考答案
更多 “ Under which Junos hierarchy level are security policies configured?() A. [edit security]B. [edit protocols]C. [edit firewall]D. [edit policy-options] ” 相关考题
考题
YournetworkcontainsanActiveDirectorydomainnamedcontoso.com.Thedomaincontainsfivedomaincontrollers.YouaddalogoffscripttoanexistingGroupPolicyobject(GPO).Youneedtoverifythateachdomaincontrollersuccessfullyreplicatestheupdatedgrouppolicy.Whichtwoobjectsshouldyouverifyoneachdomaincontroller()A.\servername\SYSVOL\contoso.com\Policies\{GUID}\gpt.iniB.\\servername\SYSVOL\contoso.com\Policies\{GUID}\machine\registry.polC.theuSNChangedvaluefortheCN={GUID},CN=Policies,CN=System,DC=contoso,DC=comcontainerD.theversionNumbervaluefortheCN={GUID},CN=Policies,CN=System,DC=contoso,DC=comcontainer
考题
There was not much ( ) in international affairs during those years.A、harmonyB、maximumC、minimumD、hierarchy
考题
Whichtypeofbackupmustbeperformedfirstwithanincrementalbackup?()
A.Level1B.Level0C.Level2D.Level3
考题
Which security or functional zone name has special significance to the Junos OS?()
A. selfB. trustC. untrustD. junos-global
考题
According to JUNOS software route selection algorithm, which IS-IS route type is most preferred?()
A. Level 1 internal routesB. Level 1 external routesC. Level 2 internal routesD. Level 2 external routes
考题
Referring to the exhibit, you are unable to commit the configuration for the ge-0/0/1 interface. What must you do to commit the configuration?()
A. You must set the vlan-tagging parameter under the [edit interfaces ge-0/0/1] hierarchy.B. You must use the rename command to change unit 100 to unit 0.C. You must set the encapsulation flexible-ethernet-services parameter under the [edit interfaces ge-0/0/1] hierarchy.D. You must set the encapsulation vlan-ccc parameter under the [edit interfaces ge-0/0/1 unit 100] hierarchy.
考题
ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis()
A./etc/security/limitsB./etc/security/mkuser.sysC./etc/security/privD./etc/security/user
考题
Which IS - IS router is equivalent to an ABR in OSPF?()
A. Level 2 - 3B. Level 1 - 2C. Level 2D. Level 0E. Level 3F. Level 1
考题
According to Para.7,which of the following is not the way that passage suggests to improve cyber-security?( ) A.Be quick to predict and respond when there is insecurity.
B.Make sure everyone is equipped with fundamental knowledge of cyber-security.
C.Be cooperative with counterparts on cyber-security.
D.Be cautious using Internet.
热门标签
最新试卷