CMS专题

单选题In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { sou

题目
单选题
In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers; application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the existing FTP and BGP sessions?()
A

The existing FTP and BGP sessions will continue.

B

The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.

C

The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.

D

The existing FTP sessions will continue and only the existing BGP sessions will be dropped.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Click the Exhibit button.In the configuration shown in the exhibit, you decided to eliminate the junos-ftp application from the match condition of the policy MyTraffic.What will happen to the existing FTP and BGPsessions?()

A. The existing FTP and BGP sessions will continue.

B. The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.

C. The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.

D. The existing FTP sessions will continue and only the existing BGP sessions will be dropped.


参考答案:B

第2题:

Click the Exhibit button.In the exhibit, what is the function of the configuration statements?()

A. This section is where you define all chassis clustering configuration.

B. This configuration is required for members of a chassis cluster to talk to each other.

C. You can apply this configuration in the chassis cluster to make configuration easier.

D. This section is where unique node configuration is applied.


参考答案:D

第3题:

You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.

You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.

Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.

You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.

A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)

You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)

You need to ensure that Paul can establish Remote Desktop connections with DC1.

What should you do? ()


参考答案:B

第4题:

Click the Exhibit button.In the exhibit, which statement is correct? ()

A. Three physical interfaces are redundant.

B. You must define an additional Redundancy Group.

C. node 0 will immediately become primary in the cluster.

D. You must issue an operational command and reboot the system for the above configuration to take effect.


参考答案:D

第5题:

Given the configuration shown in the exhibit, what is the function of the protect-loopback filter?()

A. to protect the Routing Engine

B. to protect all interfaces on the device

C. to protect the Packet Forwarding Engine

D. to protect the management interface


参考答案:A

第6题:

Click the Exhibit button.Given the configuration shown in the exhibit, which configuration object would be used to associate both Nancy andWalter with firewall user authentication within a security policy?()

A. ftp-group

B. ftp-users

C. firewall-user

D. nancy and walter


参考答案:A

第7题:

Click the Exhibit button.Given the configuration shown in the exhibit, which protocol(s) are allowed to communicate with the device on ge-0/0/0.0?()

A. RIP

B. OSPF

C. BGP and RIP

D. RIP and PIM


参考答案:A

第8题:

You are using tracing to diagnose run-time issues.When you look at the traces for the service in SvcTraceViewer.exe,you see what is shown in the exhibit:The exception trace is selected in SvcTraceViewer.exe. You need to interpret the trace results to determine where the error occurred and what to do next.What should you do?()

A.

B.

C.

D.


参考答案:B

第9题:

Click the Exhibit button.host_a is in subnet_a and host_b is in subnet_b.Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?()

A. DNS traffic is denied.

B. Telnet traffic is denied.

C. SMTP traffic is denied.

D. Ping traffic is permitted.


参考答案:B, D

第10题:

Which command will resolve the problem shown in the exhibit?()

A. user@router> request system configuration rescue save

B. user@router# request system configuration rescue save

C. user@router> file copy current /config/rescue.conf

D. user@router# file copy current /config/rescue.conf


参考答案:A

更多相关问题