参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题How many OSPF authentication types can be configured on a subinterface using JUNOS software?()A 0B 1C 2D 3”相关问题
  • 第1题:

    How many VSM modes are there in a Cisco Nexus 1000V environment?()

    • A、 0
    • B、 1
    • C、 2
    • D、 3
    • E、 4
    • F、 5

    正确答案:D

  • 第2题:

    You are running OSPF between two ERX Edge Routers across an OC-12c link with HDLC encapsulation. How many designated routers are present for this link?()

    • A、0
    • B、1
    • C、2
    • D、3

    正确答案:A

  • 第3题:

    Routers A and B are connected with a point-to-point OC-3 interface. Each routers OC-3 interface is configured for both Level 1 and Level 2. The routers are configured in different areas. How many IS-IS adjacencies exist between the two routers?()

    • A、0
    • B、1
    • C、2
    • D、3

    正确答案:B

  • 第4题:

    How many transmitters (TXs) can be configured to an omni antenna using a CDU-D?()

    • A、2
    • B、6
    • C、8
    • D、12
    • E、16

    正确答案:B

  • 第5题:

    When a packet is sent from Host 1 to Server 1, in how many different frames will the packet be  encapsulated as it is sent across the internetwork?()

    • A、0
    • B、1
    • C、2
    • D、3
    • E、4

    正确答案:D

  • 第6题:

    How many OSPF authentication types can be configured on a subinterface using JUNOS software?()

    • A、0
    • B、1
    • C、2
    • D、3

    正确答案:B

  • 第7题:

    Routers A and B are connected with a point-to-point OC-3 interface. Each router’s OC-3 interface is configured for both Level 1 and Level 2. The routers are configured in different areas.How many IS-IS adjacencies exist between the two routers?()

    • A、0
    • B、1
    • C、2
    • D、3

    正确答案:B

  • 第8题:

    The ERX Edge Router is configured for PPP over Ethernet without using VLAN tagging. How many PPP over Ethernet major interfaces can be configured per port?()

    • A、1
    • B、100
    • C、2048
    • D、4096

    正确答案:A

  • 第9题:

    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

    正确答案:B,D

  • 第10题:

    单选题
    How many syslog servers can be configured on the WX platform?()
    A

    3

    B

    5

    C

    8

    D

    10


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    How many OSPF authentication types can be configured on a subinterface using JUNOS software?()
    A

    0

    B

    1

    C

    2

    D

    3


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    How many VSM modes are there in a Cisco Nexus 1000V environment?()
    A

     0

    B

     1

    C

     2

    D

     3

    E

     4

    F

     5


    正确答案: F
    解析: 暂无解析

  • 第13题:

    A VSM is actually a virtual machine that requires how many vNICs for functioning?()

    • A、 0
    • B、 1
    • C、 2
    • D、 3
    • E、 4

    正确答案:D

  • 第14题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第15题:

    每组CAN总线需要()个终端电阻。

    • A、0
    • B、1
    • C、2
    • D、3

    正确答案:C

  • 第16题:

    A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()

    • A、authentication-order radius;
    • B、authentication-order password;
    • C、authentication-order [radius password];
    • D、authentication-order [password radius];

    正确答案:A

  • 第17题:

    What is the highest (strongest) priority that can be set on an LSP in JUNOS software?()

    • A、0
    • B、7
    • C、64
    • D、255

    正确答案:A

  • 第18题:

    Which two statements regarding external authentication servers for firewall userauthentication are true?()

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

    正确答案:B,D

  • 第19题:

    Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()

    • A、RADIUS
    • B、TACACS+
    • C、LDAP
    • D、IIS

    正确答案:A,C

  • 第20题:

    How many syslog servers can be configured on the WX platform?()

    • A、3
    • B、5
    • C、8
    • D、10

    正确答案:B

  • 第21题:

    Which two statements are true regarding firewall user authentication?()

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
    • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

    正确答案:B,C

  • 第22题:

    单选题
    In IPv6, the interfaces running OSPF can be configured with multiple ad dress prefixes. Which statement is true about the IPv6 addresses that can be included into the OSPF process?" ()
    A

    Specific addresses can be selected using a prefix list.

    B

    Specific addresses can be selected using a route map.

    C

    Specific addresses cann ot be selected for importation into the OSPF process.

    D

    Specific addresses can be selected using an ACL.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    A VSM is actually a virtual machine that requires how many vNICs for functioning?()
    A

     0

    B

     1

    C

     2

    D

     3

    E

     4


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    The ERX Edge Router is configured for PPP over Ethernet without using VLAN tagging. How many PPP over Ethernet major interfaces can be configured per port?()
    A

    1

    B

    100

    C

    2048

    D

    4096


    正确答案: A
    解析: 暂无解析