网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
What are two valid actions for routing policy?()
A
discard
B
next policy
C
accept
D
ignore
参考答案
参考解析
解析:
暂无解析
更多 “多选题What are two valid actions for routing policy?()AdiscardBnext policyCacceptDignore” 相关考题
考题
Click the Exhibit button.What are two valid reasons for the output shown in the exhibit?() (Choose two.)
A. The local Web-filtering daemon is not enabled or is not running.B. The integrated Web-filtering policy server is not reachable.C. No DNS is configured on the SRX Series device.D. No security policy is configured to use Web filtering.
考题
What are two components of the Junos software architecture? ()(Choose two.)
A. Linux kernelB. routing protocol daemonC. session-based forwarding moduleD. separate routing and security planes
考题
What are two valid Cluster load balancing methods? ()(Choose two.)
A. urlhashB. backup chainingC. least connectionsD. fewest outstanding requests
考题
Which two statements are true regarding routing policy processing?()
A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.C. Polices are evaluated based on the order in which they are applied to a routing protocol.D. Policy processing stops once the last statement in the policy is evaluated.
考题
Which two policy actions are considered flow control actions?()
A.rejectB.community addC.next termD.next policy
考题
What does RPL stand for?()A、routing primary languageB、routing policy languageC、routing police languageD、routing program languageE、routing protocol language
考题
What are two reasons why a route might be hidden?()A、route preferenceB、routing loopC、invalid next hopD、routing policy
考题
What are two components of the Junos software architecture? ()(Choose two.)A、Linux kernelB、routing protocol daemonC、session-based forwarding moduleD、separate routing and security planes
考题
What are two default routing policies on Junos devices?()A、The BGP import policy accepts all BGP routes.B、The BGP export policy rejects all active BGP routes.C、The OSPF import policy accepts all OSPF routes.D、The OSPF export policy accepts all active OSPF routes.
考题
Which two statements are true about terms in a routing policy?()A、A routing policy cannot have more than one term.B、If a term does not contain a from statement, all routes match.C、If a term does not contain a from statement, the Junos OS will not commit.D、A then statement is not mandatory in a term.
考题
What are two components of the JUNOS Software architecture?()A、Linux kernelB、routing protocol daemonC、session-based forwarding moduleD、separate routing and security planes
考题
In JUNOS software, which two are methods of restricting multicast traffic beyond your domain? ()A、MSDPB、Routing policyC、Administrative scopingD、Bootstrap export policy
考题
You are creating a destination NAT rule-set. Which two are valid for use with the from clause?()A、security policyB、interfaceC、routing-instanceD、IP address
考题
What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()A、sign-in policyB、authentication realmsC、role restrictionsD、policy realmsE、routing policy
考题
Which two statements are true regarding routing policy processing?()A、The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B、Policies are evaluated from right to left as displayed in the Junos OS configuration file.C、Polices are evaluated based on the order in which they are applied to a routing protocol.D、Policy processing stops once the last statement in the policy is evaluated.
考题
多选题What are two default routing policies on Junos devices?()AThe BGP import policy accepts all BGP routes.BThe BGP export policy rejects all active BGP routes.CThe OSPF import policy accepts all OSPF routes.DThe OSPF export policy accepts all active OSPF routes.
考题
多选题Which two policy actions are considered flow control actions?()ArejectBcommunity addCnext termDnext policy
考题
多选题You are designing a password management solution to meet the business and technical requirements. Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.
考题
多选题What are two valid match criteria for a routing policy?()AOSPF area IDBprefix listCportDtime-to-live (TTL)
考题
多选题What are two valid initial configuration methods supported on Juniper routers?()ACLIBJ-WebCJUNOScopeDPCMCIA flash card
考题
单选题What is the default export routing policy for RIP?()A
Accept all local routesB
Accept all RIP routesC
Accept no routesD
Accept all direct routes
考题
多选题Bye default, what are three valid routing tables? ()Ainet.0Binet4.0Cinet.6Dinet6.0Einet.3
考题
多选题What are two valid match criteria for a routing policy? ()AOSPF are a IDBprefix listCportDtime-to-live(TTL)
考题
多选题What are two valid Cluster load balancing methods? ()(Choose two.)AurlhashBbackup chainingCleast connectionsDfewest outstanding requests
热门标签
最新试卷