单选题Referring to the exhibit, what is the purpose of the targets section of the configuration?()A It defines which devices will be sending traps.B It specifies where to send traps.C It defines the IP addresses of management systems that can access the device.D It specifies which devices can be polled for SNMP data.

单选题
Referring to the exhibit, what is the purpose of the targets section of the configuration?()
A

It defines which devices will be sending traps.

B

It specifies where to send traps.

C

It defines the IP addresses of management systems that can access the device.

D

It specifies which devices can be polled for SNMP data.


参考解析

解析: 暂无解析

相关考题:

Click the Exhibit button.In the exhibit, what is the function of the configuration statements?() A. This section is where you define all chassis clustering configuration.B. This configuration is required for members of a chassis cluster to talk to each other.C. You can apply this configuration in the chassis cluster to make configuration easier.D. This section is where unique node configuration is applied.

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?() A. to specify the destination addresses to which access is permittedB. to specify the source address permitted to access the resourceC. to specify the services to which access is permittedD. to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?() A.B.C.D.

Referring to the exhibit, what is the purpose of the targets section of the configuration?() A. It defines which devices will be sending traps.B. It specifies where to send traps.C. It defines the IP addresses of management systems that can access the device.D. It specifies which devices can be polled for SNMP data.

You configure your Windows 2000 Professional computer for Internet Connection Sharing and for TCP/IP filtering as shown in the exhibit.You test your TCP/IP filtering configuration from another client computer. You can access web sites, but you cannot access FTP sites.What should you do to be able to access FTP sites?A.Add Port 21 to the TCP Ports section.B.Add Port 138 to the TCP Ports section.C.Add Port 21 to the IP Ports section.D.Add Port 138 to the IP Ports section.

Physical and logical network diagrams are used for which of the following configuration management goals?() A. Track DHCP distributionB. Compare MAC and IP addressesC. Document Internet access historyD. Identity network devices

What is the function of the CSMA/CD algorithm in Ethernet technologies?() A. defines how the media is accessedB. supplies a token to determine which host has access to the mediaC. defines the encoding of electrical signals on the wireD. determines the preamble bits

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?() A. defines the source IP address that i s used in all broadcast packets on DLCI 202B. defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP addressC. defines the destination IP address that is used in all broadcast packets on DLCI 202D. defines the DLCI on which packets from the 192.168.1.2 IP address are received

What is the function of the CSMA/CD algorithm in Ethernet technologies?()A、defines how the media is accessedB、supplies a token to determine which host has access to the mediaC、defines the encoding of electrical signals on the wireD、determines the preamble bits

What is the purpose of an address book?()A、It holds security policies for particular hosts.B、It holds statistics about traffic to and from particular hosts.C、It defines hosts in a zone so they can be referenced by policies.D、It maps hostnames to IP addresses to serve as a backup to DNS resolution.

What is a criteria of the enterprise composite network model?()A、 includes all modules needed to meet any network designB、 defines flexible boundaries between modules for scalability requirementsC、 clearly defines module boundaries and demarcation points to identify where traffic isD、 requires specific core, distribution, and access layer requirements to match the model

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()A、defines the source IP address that is used in all broadcast packets on DLCI 202B、defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP addressC、defines the destination IP address that is used in all broadcast packets on DLCI 202D、defines the DLCI on which packets from the 192.168.1.2 IP address are received

Information about a managed devices resources and activity is defined by a series of objects. What defines the structure of these management objects?()A、MIBB、FIBC、LDAPD、CEF

Physical and logical network diagrams are used for which of the following configuration management goals?()A、Track DHCP distributionB、Compare MAC and IP addressesC、Document Internet access historyD、Identity network devices

What is the purpose of /etc/uucp/Devices?()A、Defines permissions for remote machines contacting the local machine through BNUB、Specifies dialer and modem types for uucp connectionsC、Defines basic communication parametersD、Assigns alternate or additional Systems, Devices and Dialers files

When tuning a network module what is the purpose of the grace period?()A、It defines the maximum permissible time period between missed heartbeats before a failure is detectedB、It defines the time period to wait to activate the network module after starting the cluster managerC、It defines the period between detecting a missed heartbeat and initiating a network down, allowing thenetwork to stabilizeD、It defines the time period during which, after a network failure was detected, further network failures of thesame type will be ignored

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A、to specify the destination addresses to which access is permittedB、to specify the source address permitted to access the resourceC、to specify the services to which access is permittedD、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

What is the purpose of a zone in JUNOS Software?()A、A zone defines a group of security devices with a common management.B、A zone defines the geographic region in which the security device is deployed.C、A zone defines a group of network segments with similar security requirements.D、A zone defines a group of network segments with similar class-of-service requirements.

单选题Click the Exhibit button. In the exhibit, what is the function of the configuration statements?()A This section is where you define all chassis clustering configuration.B This configuration is required for members of a chassis cluster to talk to each other.C You can apply this configuration in the chassis cluster to make configuration easier.D This section is where unique node configuration is applied.

单选题In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()Ato specify the destination addresses to which access is permittedBto specify the source address permitted to access the resourceCto specify the services to which access is permittedDto inform the enforcer to expect policy information from the Junos Pulse Access Control Service

单选题When tuning a network module what is the purpose of the grace period?()AIt defines the maximum permissible time period between missed heartbeats before a failure is detectedBIt defines the time period to wait to activate the network module after starting the cluster managerCIt defines the period between detecting a missed heartbeat and initiating a network down, allowing thenetwork to stabilizeDIt defines the time period during which, after a network failure was detected, further network failures of thesame type will be ignored

单选题Which of the following defines access for a network?()AACLBRDFCRASDARP

单选题What is the purpose of an address book?()AIt holds security policies for particular hosts.BIt holds statistics about traffic to and from particular hosts.CIt defines hosts in a zone so they can be referenced by policies.DIt maps hostnames to IP addresses to serve as a backup to DNS resolution.

单选题Physical and logical network diagrams are used for which of the following configuration management goals?()ATrack DHCP distributionBCompare MAC and IP addressesCDocument Internet access historyDIdentity network devices

单选题Information about a managed devices resources and activity is defined by a series of objects. What defines the structure of these management objects?()AMIBBFIBCLDAPDCEF

单选题What is a criteria of the enterprise composite network model?()A includes all modules needed to meet any network designB defines flexible boundaries between modules for scalability requirementsC clearly defines module boundaries and demarcation points to identify where traffic isD requires specific core, distribution, and access layer requirements to match the model

单选题What is the purpose of a zone in JUNOS Software?()AA zone defines a group of security devices with a common management.BA zone defines the geographic region in which the security device is deployed.CA zone defines a group of network segments with similar security requirements.DA zone defines a group of network segments with similar class-of-service requirements.