A. Hop Limit B. Next Header C. Fragment Offset D. Header Checksum
单项选择题You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
A. then reject B. then discard C. then next filter D. then silent-drop
单项选择题Which code causes only a Level 2 adjacency to be formed under the SONET interface so-2 2 2 withFrame Relay encapsulation?Which code causes only a Level 2 adjacency to be formed under the SONET interface so-2 2 2 with Frame Relay encapsulation?()
A. B. C. D.
多项选择题What are two characteristics of the RED algorithm as implemented in JUNOS software?()
A. It profiles based on bandwidth. B. It profiles based on loss priority. C. It prevents traffic loss through buffering. D. It prevents global synchronization with tail drops.
单项选择题What is the maximum suppress time for a damped route, by default?()
A. 5 minutes B. 30 minutes C. 60 minutes D. 90 minutes
单项选择题A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()
A. authentication-order radius; B. authentication-order password; C. authentication-order [radius password]; D. authentication-order [password radius];