网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
How are multiple policies evaluated within the JUNOS software?()
A
alphabetically
B
as an ordered list
C
in a round robin manner
D
numerically from lowest to highest
参考答案
参考解析
解析:
暂无解析
更多 “单选题How are multiple policies evaluated within the JUNOS software?()A alphabeticallyB as an ordered listC in a round robin mannerD numerically from lowest to highest” 相关考题
考题
How are multiple policies evaluated within the JUNOS software?()
A. alphabeticallyB. as an ordered listC. in a round robin mannerD. numerically from lowest to highest
考题
Intheexhibit,youdecidedtochangemyHostsaddresses.[editsecuritypolicies]user@hostshowfrom-zonePrivateto-zoneExternal{policyMyTraffic{match{source-addressmyHosts;destination-addressExtServers;application[junos-ftpjunos-bgp];}then{permit{tunnel{ipsec-vpnvpnTunnel;}}}}}policy-rematch;Whatwillhappentothenewsessionsmatchingthepolicyandin-progresssessionsthathadalreadymatchedthepolicy?()A.Newsessionswillbeevaluated.In-progresssessionswillbere-evaluated.B.Newsessionswillbeevaluated.Allin-progresssessionswillcontinue.C.Newsessionswillbeevaluated.Allin-progresssessionswillbedropped.D.Newsessionswillhaltuntilallin-progresssessionsarere-evaluated.In-progresssessionswillbere-evaluatedandpossiblydropped.
考题
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()A. Session-Export policies on the Junos Pulse Secure Access ServiceB. Session-Export policies on the Junos Pulse Access Control ServiceC. Session-Import policies on the Junos Pulse Secure Access ServiceD. Session-Import policies on the Junos Pulse Access Control ServiceE. Resource access policies on the Junos Pulse Access Control Service
考题
You have configured a Classifier Access Control List(CLACL)with multiple match clauses.Each match clause has multiple defined fields within it.Which two statements describe how the router evaluates this CLACL?()A.All fields in each match clause must match.B.All match clauses in the CLACL must match.C.Only asingle field in each match clause must match.D.Only asingle match clause in the CLACL must match
考题
Which two statements are true regarding routing policy processing?()
A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.C. Polices are evaluated based on the order in which they are applied to a routing protocol.D. Policy processing stops once the last statement in the policy is evaluated.
考题
What is an advantage of multiple software process running in the Junos OS?()A、Each process has its own protected memory spaceB、Each process is started manually by the user at bootC、Aall processes are dependent on each otherD、Multiple processes allow each routing protocol to be independent
考题
In the exhibit, you decided to change myHosts addresses. [edit security policies] user@host# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers;application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the new sessions matching the policy and in-progress sessions that hadalready matched the policy?()A、New sessions will be evaluated. In-progress sessions will be re-evaluated.B、New sessions will be evaluated. All in-progress sessions will continue.C、New sessions will be evaluated. All in-progress sessions will be dropped.D、New sessions will halt until all in-progress sessions are re-evaluated. In-progress sessions will be re-evaluated and possibly dropped.
考题
In JUNOS software, how is route summarization at the L1/L2 border configured?()A、By specifying the area-range statement.B、By creating aggregate routes and applying policies.C、By specifying the route-summarization statement.D、By specifying the area-range restrict statement.
考题
How are multiple policies evaluated within the JUNOS software?()A、alphabeticallyB、as an ordered listC、in a round robin mannerD、numerically from lowest to highest
考题
In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers; application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the existing FTP and BGP sessions?()A、The existing FTP and BGP sessions will continue.B、The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.C、The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.D、The existing FTP sessions will continue and only the existing BGP sessions will be dropped.
考题
Under which Junos hierarchy level are security policies configured?()A、[edit security]B、[edit protocols]C、[edit firewall]D、[edit policy-options]
考题
Which two statements are true regarding routing policy processing?()A、The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B、Policies are evaluated from right to left as displayed in the Junos OS configuration file.C、Polices are evaluated based on the order in which they are applied to a routing protocol.D、Policy processing stops once the last statement in the policy is evaluated.
考题
单选题Which statement is correct about policies in the Junos OS?()A
Import policies are used to filter routes from the routing table to the forwarding table.B
Import policies are used to filter routes destined for the routing table.C
Import policies are used to filter routes being sent to neighboring devices.D
Import policies are used to filter traffic entering the device.
考题
单选题How are multiple policies evaluated within the JUNOS software?()A
alphabeticallyB
as an ordered listC
in a round robin mannerD
numerically from lowest to highest
考题
多选题If Host Checker restrictions are applied at the role level and the "Allow access to the role if any ONE of the select policies is passed" option is unchecked, which two statements are true?()AAll roles are evaluated together.BEach role is evaluated separately.CClients must pass all policies to access the role.DClients will pass as long as one policy is accepted.
考题
单选题In JUNOS software, how is route summarization at the L1/L2 border configured?()A
By specifying the area-range statement.B
By creating aggregate routes and applying policies.C
By specifying the route-summarization statement.D
By specifying the area-range restrict statement.
考题
单选题A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A
The first authentication realm that was added to the sign-in policy is used by default.B
The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C
When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D
This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.
考题
单选题In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers; application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the existing FTP and BGP sessions?()A
The existing FTP and BGP sessions will continue.B
The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.C
The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.D
The existing FTP sessions will continue and only the existing BGP sessions will be dropped.
考题
单选题Under which Junos hierarchy level are security policies configured?()A
[edit security]B
[edit protocols]C
[edit firewall]D
[edit policy-options]
考题
多选题Cisco UCS Manager provides the ability to manage power utilization to the blades. Which two statements about UCS Manager power policies are true? ()APower capping helps mainly in reducing data center footprint.BPower capping helps reduce data center cooling.CA single power cap group policy allows you to set power limits across multiple UCS domains.DYou can have multiple power cap groups per UCS domain.EEach blade within a UCS 5108 chassis can belong to a separate power cap group.
考题
单选题You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()A
Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.B
Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.C
Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.D
Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.
考题
多选题Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()ASession-Export policies on the Junos Pulse Secure Access ServiceBSession-Export policies on the Junos Pulse Access Control ServiceCSession-Import policies on the Junos Pulse Secure Access ServiceDSession-Import policies on the Junos Pulse Access Control ServiceEResource access policies on the Junos Pulse Access Control Service
考题
多选题You have configured a Classifier Access Control List(CLACL)with multiple match clauses.Each match clause has multiple defined fields within it.Which two statements describe how the router evaluates this CLACL?()AAll fields in each match clause must match.BAll match clauses in the CLACL must match.COnly asingle field in each match clause must match.DOnly asingle match clause in the CLACL must match
考题
单选题Your network consists of a single Active Directory domain. The functional level of the forest is Windows Server 2008. You need to create multiple password policies for users in your domain. What should you do()A
From the Schema snap-in, create multiple class schema objects.B
From the ADSI Edit snap-in, create multiple Password Setting objects.C
From the Security Configuration Wizard, create multiple security policies.D
From the Group Policy Management snap-in, create multiple Group Policy objects.
考题
单选题Your network consists of a single Active Directory domain. The functional level of the forest is Windows Server 2008 R2. You need to create multiple password policies for users in your domain. What should you do()A
From the Active Directory Schema snap-in, create multiple class schema objects.B
From the ADSI Edit snap-in, create multiple Password Setting objects.C
From the Security Configuration Wizard, create multiple security policies.D
From the Group Policy Management snap-in, create multiple Group Policy objects.
考题
单选题Which statement is correct about policies in the Junos OS?()A
Export policies are used to filter routes from the RE forwarding table to the PFE forwarding table.B
Export policies are used to filter routes destined for the routing table.C
Export policies are used to filter routes being sent to neighboring devices.D
Export policies are used to filter traffic leaving the device.
考题
单选题What is true when designing OSPF import routing policy in JUNOS software?()A
Import policies are not possible.B
Import policies only match on external routes.C
Import policies only match on internal routes.D
Import policies can cause inconsistent link state databases.
考题
多选题Which two statements are true regarding routing policy processing?()AThe Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.BPolicies are evaluated from right to left as displayed in the Junos OS configuration file.CPolices are evaluated based on the order in which they are applied to a routing protocol.DPolicy processing stops once the last statement in the policy is evaluated.
热门标签
最新试卷