JN0-102

多选题You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()AICMPBSNMPCTCPDHTTPS

题目
多选题
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()
A

ICMP

B

SNMP

C

TCP

D

HTTPS

参考答案和解析
正确答案: A,D
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are correct about firewall filters in the Junos OS?()

A. Firewall filters are stateless.

B. Firewall filters are used to control routing information that is exchanged between devices.

C. Firewall filters are used to control traffic passing through the device.

D. Firewall filters can only be applied to traffic entering the device.


参考答案:A, C

第2题:

You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?()

A. TFTP

B. FTP

C. SCP

D. SFTP


参考答案:B, C

第3题:

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

A. access profile

B. IKE parameters

C. tunneled interface

D. redirect policy


参考答案:A, B

第4题:

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

  • A、access profile
  • B、IKE parameters
  • C、tunneled interface
  • D、redirect policy

正确答案:A,B

第5题:

The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()

  • A、 Business-critical traffic will be sorted into two QoS classes.
  • B、 Real-time traffic will be sorted into one QoS class.
  • C、 Voice traffic will be considered real-time traffic while call signaling will be considered business-critical.
  • D、 All traffic except real-time will be considered best-effort.
  • E、 Routing, management, and transactional traffic will be considered business-critical.
  • F、 Voice and call signaling traffic will be considered real-time.

正确答案:E,F

第6题:

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()

A. ICMP

B. SNMP

C. TCP

D. HTTPS


参考答案:A, C

第7题:

Which two of these are differences between traffic policing and traffic shaping?()

  • A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available again
  • B、with policing you can tune the buffer usage for traffic exceeding the specified CIR
  • C、with shaping you can tune the buffer usage for traffic exceeding the specified CIR
  • D、shaping should only be applied for ingress traffic,policing only for egress
  • E、policing uses a token bucket algorithm,shaping uses an SPD algorithm

正确答案:A,C

第8题:

Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)

A. It is necessary to forward ARP requests to remote hosts.

B. It is necessary when translated traffic belongs to the same subnet as the ingress interface.

C. It is not automatic and you must configure it.

D. It is enabled by default and you do not need to configure it.


参考答案:B, C

第9题:

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()

  • A、ICMP
  • B、SNMP
  • C、TCP
  • D、HTTPS

正确答案:A,C

第10题:

You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()

  • A、You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
  • B、No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
  • C、You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
  • D、You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

正确答案:A

更多相关问题