Which three functions are available under the "Maintain" tab of J-Web?()A、download and delete log filesB、view real-time statistics of interfacesC、reboot the systemD、view and add licensesE、edit security settings

Which three functions are available under the "Maintain" tab of J-Web?()

  • A、download and delete log files
  • B、view real-time statistics of interfaces
  • C、reboot the system
  • D、view and add licenses
  • E、edit security settings

相关考题:

Which two design goals describe the Junos OS design?()A、clean separation of security and routing policiesB、clean separation of control and forwarding planesC、modularization of multiple software processesD、a single hardware platform for all software applications

Which route filter match type only matches prefixes greater than the defined prefix?()A、exactB、uptoC、longerD、orlonger

What must be configured prior to the first commit after factory defaults are loaded?()A、root authenticationB、default gatewayC、host nameD、management services

In the output of show isis adjacency, what are three valid items that can be displayed under the attributes header?()A、IS typeB、attachedC、overloadD、area addresses

Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()A、username="*" - Employee-role Stop username="con-*" - Contractor-roleB、username="*" - Employee-role username="con-*" - Contractor-role StopC、username="con-*" - Contractor-role Stop username="*" - Employee-roleD、username="con-*" - Contractor-role username="*" - Employee-role Stop

Which statement describes a security zone?()A、A security zone can contain one or more interfaces.B、A security zone can contain interfaces in multiple routing instances.C、A security zone must contain two or more interfaces.D、A security zone must contain bridge groups.

Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when performing Layer 2 enforcement?()A、EAPB、RADIUSC、SSLD、EAP-o-HTTP