单选题Which statement is true regarding redundancy groups?()AThe preempt option determines the primary and secondary roles for redundancy group 0 during a failure and recovery scenario.BWhen priority settings are equal and the members participating in a cluster are initialized at the same time, the primary role for redundancy group 0 is assigned to node 1.CThe primary role can be shared for redundancy group 0 when the active-active option is enabled.DRedundancy group 0 manages the control plane failover between the nodes of a cluster.

单选题
Which statement is true regarding redundancy groups?()
A

The preempt option determines the primary and secondary roles for redundancy group 0 during a failure and recovery scenario.

B

When priority settings are equal and the members participating in a cluster are initialized at the same time, the primary role for redundancy group 0 is assigned to node 1.

C

The primary role can be shared for redundancy group 0 when the active-active option is enabled.

D

Redundancy group 0 manages the control plane failover between the nodes of a cluster.


参考解析

解析: 暂无解析

相关考题:

单选题What is a redundancy group in JUNOS Software?()Aa set of chassis clusters that fail over as a groupBa set of devices that participate in a chassis clusterCa set of VRRP neighbors that fail over as a groupDa set of chassis cluster objects that fail over as a group

单选题Which statement is true about source NAT?()ASource NAT works only with source pools.BDestination NAT is required to translate the reply traffic.CSource NAT does not require a security policy to function.DThe egress interface IP address can be used for source NAT

单选题Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing asecurity policy change?()Apolicy-rematchBpolicy-evaluateCrematch-policyDevaluate-policy

多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication

多选题Which three parameters are configured in the IKE policy?()AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings

单选题Where do you configure SCREEN options?()Azones on which an attack might arriveBzones you want to protect from attackCinterfaces on which an attack might arriveDinterfaces you want to protect from attack

单选题What is the functionality of redundant interfaces (reth) in a chassis cluster?()Areth interfaces are used only for VRRP.Breth interfaces are the same as physical interfaces.Creth interfaces are pseudo-interfaces that are considered the parent interface for two physical interfaces.DEach cluster member has a reth interface that can be used to share session state information with the other cluster members.

多选题Users can define policy to control traffic flow between which two components?()Afrom a zone to the device itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface