网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which two statements are true regarding an Ethernet collision domain?()

  • A、If a switch is used, the collision domain is limited to each device and the switch
  • B、If a hub is used, the collision domain is limited to each device and the hub
  • C、If a hub is used, the collision domain includes all devices connected to the hub
  • D、If a switch is used, the collision domain includes all devices connected to the switch

参考答案

更多 “Which two statements are true regarding an Ethernet collision domain?()A、If a switch is used, the collision domain is limited to each device and the switchB、If a hub is used, the collision domain is limited to each device and the hubC、If a hub is used, the collision domain includes all devices connected to the hubD、If a switch is used, the collision domain includes all devices connected to the switch” 相关考题
考题 The router receives a login request from a PPP over ATM client and examines the domain map for the client's domain. The router finds no entries currently configured within the domain map. What does the router do with the login request?()A、The router rejects it.B、The router tunnels it via L2TP.C、The router authenticates it locally.D、The default virtual router authenticates it.

考题 By default, which character indicates the UNIX shell prompt?()A、#B、C、$D、%

考题 Which statement is true about the routing table?()A、The routing table exists in the control plane only.B、The routing table exists in the control plane and in the forwarding plane.C、The routing table contains both active and inactive routes.D、The routing table is stored on compact flash.

考题 A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()A、from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C、from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

考题 You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in the Untrust zone. How do you create this policy?()A、Specify the IP address (172.19.1.1/32) as the destination address in the policy.B、Specify the DNS entry (hostb.example.com.) as the destination address in the policy.C、Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.D、Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy

考题 What are two valid actions for a routing policy?()A、discardB、next policyC、acceptD、ignore

考题 By default, to which peers will a BGP router advertise routes learned from IBGP peers?()A、all BGP peersB、all IBGP peersC、all EBGP peersD、all MBGP peers

考题 An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)A、Only main mode can be used for IKE negotiationB、A local-identity must be definedC、It must be the initiator for IKED、A remote-identity must be defined

考题 In a Bridged 1483 network, which set of configuration commands allows the router to forward requests from the PC to an external DHCP server at 3.3.3.3?()A、set dhcp relay 3.3.3.3 set dhcp relay agentB、enable dhcp relay agent set dhcp relay agentC、set dhcp server 3.3.3.3 enable dhcp relay agentD、enable dhcp server 3.3.3.3 enable dhcp relay agent

考题 Which two statements are true about the rescue configuration file?()A、It must include a root password.B、It is rollback file number 50, and you can recover it by issuing rollback 50.C、It is created by issuing request system configuration rescue save.D、It is updated automatically when you commit.

考题 Given the following two AS path regular expressions: "65000+ (65001|65002)" "65000(65001|65002){0,}" Which AS path matches both regular expressions?()A、65000 65001 65002B、65000 65002C、65001 65000D、65001 65002