Export polices can evaluate only active routes
Export polices can evaluate all routes
Export polices can be applied to the forwarding table
Export polices can be applied to interfaces
第1题:
A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.
B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.
C. Polices are evaluated based on the order in which they are applied to a routing protocol.
D. Policy processing stops once the last statement in the policy is evaluated.
第2题:
A. Export polices can evaluate only active routes
B. Export polices can evaluate all routes
C. Export polices can be applied to the forwarding table
D. Export polices can be applied to interfaces
第3题:
A. An individual policy can have only one scheduler applied.
B. You must manually configure system-time updates.
C. Multiple policies can use the same scheduler.
D. Policies that do not have schedulers are not active.
第4题:
Which two statements apply to policy scheduling?() (Choose two.)
第5题:
Which statement about the S-Series native FTP proxy is not true?()
第6题:
A.Import policies concern routes received and determine which routes get put into the routing table.
B.Export policies concern routes received and determine which routes get put into the routing table.
C.Export policies are applied before the routing table.
D.Import polices are applied after the routing table.
第7题:
Which of the following is NOT true of security attacks?
[A] Employees will keep up with security polices and awareness if they are highly-trained.
[B] The rate of security attacks appears faster than the growth of the Internet.
[C] One's computer system will never be secure.
[D] Vulnerabilities can go through phones, wireless devices, and network appliances
第8题:
A. It polices each individual session to an explicit rate.
B. It does not police, but never allows link oversubscription.
C. It polices the aggregate rate of all sessions to an explicit rate.
D. It does not police, but limits the amount of reservable bandwidth.
第9题:
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()
第10题:
By default, which two statements are true about export routing policies?()