单选题In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers; application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the existing FTP and BGP sessions?()AThe existing FTP and BGP sessions will continue.BThe existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.CThe existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.DThe existing FTP sessions will continue and only the existing BGP sessions will be dropped.

单选题
In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers; application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the existing FTP and BGP sessions?()
A

The existing FTP and BGP sessions will continue.

B

The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.

C

The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.

D

The existing FTP sessions will continue and only the existing BGP sessions will be dropped.


参考解析

解析: 暂无解析

相关考题:

You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)You need to ensure that Paul can establish Remote Desktop connections with DC1.What should you do? ()

You are using tracing to diagnose run-time issues.When you look at the traces for the service in SvcTraceViewer.exe,you see what is shown in the exhibit:The exception trace is selected in SvcTraceViewer.exe. You need to interpret the trace results to determine where the error occurred and what to do next.What should you do?()A.B.C.D.

Click the Exhibit button.In the configuration shown in the exhibit, you decided to eliminate the junos-ftp application from the match condition of the policy MyTraffic.What will happen to the existing FTP and BGPsessions?()A. The existing FTP and BGP sessions will continue.B. The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.C. The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.D. The existing FTP sessions will continue and only the existing BGP sessions will be dropped.

Click the Exhibit button.Given the configuration shown in the exhibit, which configuration object would be used to associate both Nancy andWalter with firewall user authentication within a security policy?()A. ftp-groupB. ftp-usersC. firewall-userD. nancy and walter

Click the Exhibit button.In the exhibit, what is the function of the configuration statements?() A. This section is where you define all chassis clustering configuration.B. This configuration is required for members of a chassis cluster to talk to each other.C. You can apply this configuration in the chassis cluster to make configuration easier.D. This section is where unique node configuration is applied.

Click the Exhibit button.Given the configuration shown in the exhibit, which protocol(s) are allowed to communicate with the device on ge-0/0/0.0?() A. RIPB. OSPFC. BGP and RIPD. RIP and PIM

Given the configuration shown in the exhibit, what is the function of the protect-loopback filter?() A. to protect the Routing EngineB. to protect all interfaces on the deviceC. to protect the Packet Forwarding EngineD. to protect the management interface

Click the Exhibit button.host_a is in subnet_a and host_b is in subnet_b.Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?() A. DNS traffic is denied.B. Telnet traffic is denied.C. SMTP traffic is denied.D. Ping traffic is permitted.

Click the Exhibit button.In the exhibit, which statement is correct? () A. Three physical interfaces are redundant.B. You must define an additional Redundancy Group.C. node 0 will immediately become primary in the cluster.D. You must issue an operational command and reboot the system for the above configuration to take effect.

Which command will resolve the problem shown in the exhibit?() A. user@router request system configuration rescue saveB. user@router# request system configuration rescue saveC. user@router file copy current /config/rescue.confD. user@router# file copy current /config/rescue.conf

You are investigating routing problems on a device running the Junos OS. You receive the error shown in the exhibit when you attempt to restart the routing process.Which statement describes the problem?()A. You have typed an invalid command.B. You must be in configuration mode to restart the routing process.C. You do not have permission to restart the routing process.D. You must wait until close of business to restart the routing process, based on user-defined policy.

You configure your Windows 2000 Professional computer for Internet Connection Sharing and for TCP/IP filtering as shown in the exhibit.You test your TCP/IP filtering configuration from another client computer. You can access web sites, but you cannot access FTP sites.What should you do to be able to access FTP sites?A.Add Port 21 to the TCP Ports section.B.Add Port 138 to the TCP Ports section.C.Add Port 21 to the IP Ports section.D.Add Port 138 to the IP Ports section.

You are the administrator of a SQL Server 2000 computer. The server contains database named Sales. Users report that they cannot add new data to the database. You examine the properties of the database. The database is configured as shown in the Sales Properties exhibit.You examine drive E. The hard disk is configured as shown in the Local Disk Properties exhibit.You want the users to be able to add data, and you want to minimize administrative overhead. What should you do?A.Increase the maximum file size of Sales_Data to 1,500MB.B.Use the DBCC SHRINKDATABASE statement.C.Set automatic file growth to 10 percent.D.Create another data file named Sales_Data2 in a new SECONDARY filegroup.

Refer to the exhibit. A network associate has configured OSPF with the command:City(config-router) network 192.168.12.64 0.0.0.63 area 0After completing the configuration, the associate discovers that not all the interfaces are participating in OSPF. Which three of the interfaces shown in the exhibit will participate in OSPF according to this configuration statement? ()A.FastEthernet0 /0B.FastEthernet0 /1C.Serial0/0D.Serial0/1.102E.Serial0/1.103F.Serial0/1.104

You work as an application developer at Certkiller .com. You are in the process of creating an application for Certkiller .com’s Human Resources department that tracks employee benefits. You have to store current employee data without recompiling the application. You elect to store this employee data as a custom section in the application configuration file. The relevant portion of the application configuration file is shown in the following exhibit: ?xml version="1.0" encoding="utf-8" ?         You want to use the .NET 2.0 Configuration API to access the custom section. You need to ensure that programmatic access of the EmployeeSection element is enabled. What should you do?()A、 Create a custom section handler class that inherits the ConfigurationSection interface.B、 Add a section element to the EmployeeSection element of the application configuration file.C、 Create a custom section handler class that implements the IConfigurationSectionHandler interface.D、 Add an EmployeeSection element to the configSections element of the application configuration file.E、 Create a custom section handler class that implements the IApplicatioSettingsProvider interface.F、 Add a section element to the configSections element of the application configuration file.

Refer to the exhibit. The DHCP configuration that is shown is configured on a Cisco router. Whichstatement is true?()A、The router will distribute IP addresses from pool 1 until its addresses are exhausted. Then therouter will begin distributing addresses from pool 2B、The configuration is invalid because the DHCP options are global configuration commandsC、The configuration is incomplete until the DHCP pools are bound to the appropriate interface orinterfacesD、The router will choose which pool to use based upon the interface the DHCP request wasreceived on

In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers; application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the existing FTP and BGP sessions?()A、The existing FTP and BGP sessions will continue.B、The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.C、The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.D、The existing FTP sessions will continue and only the existing BGP sessions will be dropped.

You have two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2). The IP configuration for Server1 is shown in the Server1 IP exhibit. (Click the Exhibit button.) The IP configuration for Server2 is shown in the Server2 IP exhibit. (Click the Exhibit button.) Server1 is unable to contact Server2. You need to ensure that Server1 can contact Server2.  What should you do?() A、On Server2, modify the subnet mask. B、On Server1, modify the DNS server address. C、On Server2, change the node type to broadcast. D、On Server1, configure a static IP address for the Local Area Connection.

You have an Active Directory domain named contoso.com. You have a domain controller named  Server1 that is configured as a DNS server. Server1 hosts a standard primary zone for contoso.com. The DNS configuration of Server1 is shown in the exhibit. (Click the Exhibit button.)  You discover that stale resource records are not automatically removed from the contoso.com  zone. You need to ensure that the stale resource records are automatically removed from the  contoso.com zone.     What should you do()A、Set the scavenging period of Server1 to 0 days.B、Modify the Server Aging/Scavenging properties.C、Configure the aging properties for the contoso.com zone.D、Convert the contoso.com zone to an Active Directory-integrated zone.

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 is located in a branch office. You discover that users cannot obtain cached documents from Server1. The BranchCache configuration on Server1 is shown in the exhibit. (Click the Exhibit button.) You need to ensure that Server1 hosts cached content for client computers in the branch office. What should you do?()A、Enable Peer Discovery firewall rulesB、Set the Startup Type of the BranchCache service to Automatic, and then start the serviceC、At the command prompt, run netsh.exe branchcache set service mode=DISTRIBUTEDD、At the command prompt, run netsh.exe branchcache set service mode=HOSTEDCLIENT

You work as an application developer at Cer-Tech.com.You are in the process of creating an application for Cert-Tech.com’s Human Resources department that tracks employee benefits You have to store current employee data without recompiling the application. You elect to store this employee data as a custom section in the application configuration file. The relevant portion of the application configuration file is shown in the following exhibit: What should you do?()A、 Create a custom section handler class that inherits the ConfigurationSection interfaceB、 Add a section element to the EmployeeSection element of the application configuration fileC、 Create a custom section handler class that implements the IConfigurationSectionHandler interface.D、 Add an EmployeeSection element to the configSections element of the application confguration fileE、 Create a custom section handler class that implements the IApplicationSettingsProvider interfaceF、 Add a section element to the configSections element of the application configuration file

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 is located in a branch office. You view the BranchCache configuration of Server1 as shown in the exhibit. (Click the Exhibit button.) You need to ensure that client computers in the branch office retrieve cached files from Server1 only. What should you do on Server1?()A、Install the BranchCache for Network Files role serviceB、Install the Services for Network File System role serviceC、Run netsh.exe branchcache set service mode=DISTRIBUTEDD、Run netsh.exe branchcache set service mode=HOSTEDSERVER

多选题You work as an application developer at Certkiller .com. You are in the process of creating an application for Certkiller .com’s Human Resources department that tracks employee benefits. You have to store current employee data without recompiling the application. You elect to store this employee data as a custom section in the application configuration file. The relevant portion of the application configuration file is shown in the following exhibit:          You want to use the .NET 2.0 Configuration API to access the custom section. You need to ensure that programmatic access of the EmployeeSection element is enabled. What should you do?()ACreate a custom section handler class that inherits the ConfigurationSection interface.BAdd a section element to the EmployeeSection element of the application configuration file.CCreate a custom section handler class that implements the IConfigurationSectionHandler interface.DAdd an EmployeeSection element to the configSections element of the application configuration file.ECreate a custom section handler class that implements the IApplicatioSettingsProvider interface.FAdd a section element to the configSections element of the application configuration file.

单选题Given the configuration and routing table shown in the exhibit, which routes will be advertised to OSPF neighbors because of the demo policy?()A 192.168.0.0/16 onlyB 192.168.50.0/24 onlyC 192.168.50.0/24 and 192.168.51.0/24D 192.168.0.0/17, 192.168.50.0/24, and 192.168.51.0/24

单选题Click the Exhibit button. In the exhibit, what is the function of the configuration statements?()A This section is where you define all chassis clustering configuration.B This configuration is required for members of a chassis cluster to talk to each other.C You can apply this configuration in the chassis cluster to make configuration easier.D This section is where unique node configuration is applied.

单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejectedB The traffic will be droppedC The traffic will be forwardedD The traffic will be policed

单选题Click the Exhibit button. In the exhibit, which statement is correct? ()A Three physical interfaces are redundant.B You must define an additional Redundancy Group.C node 0 will immediately become primary in the cluster.D You must issue an operational command and reboot the system for the above configuration to take effect.

单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejected.B The traffic will be dropped.C The traffic will be forwarded.D The traffic will be policed.