Regarding L2TP, in which two situations is a service module or service IOA required?() (Choose two.)A、always for LNSB、always for LACC、LAC with fragmentation in the tunnelD、LNS when there are greater than 2000 sessions
Regarding L2TP, in which two situations is a service module or service IOA required?() (Choose two.)
- A、always for LNS
- B、always for LAC
- C、LAC with fragmentation in the tunnel
- D、LNS when there are greater than 2000 sessions
相关考题:
Which two statements regarding symmetric key encryption are true?() (Choose two.) A. The same key is used for encryption and decryption.B. It is commonly used to create digital certificate signatures.C. It uses two keys: one for encryption and a different key for decryption.D. An attacker can decrypt data if the attacker captures the key used for encryption.
Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.) A. LDP uses Down Stream On Demand.B. RSVP uses Down Stream On Demand.C. LDP uses Down Stream Unsolicited.D. RSVP uses Down Stream Unsolicited.
Which CLI command is used to enable L2TP tunnel switching?() A. l2tp tunnellingB. l2tp tunnel switchingC. l2tp tunnel-switchingD. enable l2tp tunnel switching
Which two statements are true regarding L2TP? ()(Choose two.) A. Tunnels are initiated by the LACB. Tunnels are initiated by the LNSC. By default, subscriber authentication occurs on the LNSD. By default, subscriber authentication occurs on the LAC
Regarding L2TP, in which two situations is a service module or service IOA required?() (Choose two.) A. always for LNSB. always for LACC. LAC with fragmentation in the tunnelD. LNS when there are greater than 2000 sessions
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)A、A client group is a list of clients associated with a group.B、A client group is a list of groups associated with a client.C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
In PPPoA architecture, which two methods are most commonly deployed?()A、terminating PPP sessions at the service providerB、PPP framingC、PPP multiplexingD、GRE tunnelingE、L2TP tunneling
Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC
Where can L2TP tunnel attributes be obtained by an LAC? ()(Choose two.)A、profileB、l2tp destination profileC、RADIUS serverD、domain map
Which two statements are true regarding high-availability chassis clustering?()A、A chassis cluster consists of two devices.B、A chassis cluster consists of two or more devices.C、Devices participating in a chassis cluster can be different models.D、Devices participating in a chassis cluster must be the same models
Which two statements are true regarding L2TP? ()(Choose two.)A、Tunnels are initiated by the LACB、Tunnels are initiated by the LNSC、By default, subscriber authentication occurs on the LNSD、By default, subscriber authentication occurs on the LAC
Which two statements regarding JUNOS architecture are correct?()A、The Routing Engine handles all exception traffic.B、The Routing Engine synchronizes the route table with the PFEC、The Routing Engine is hot-pluggable.D、The Routing Engine controls the PFE
Which CLI command is used to enable L2TP tunnel switching?()A、l2tp tunnellingB、l2tp tunnel switchingC、l2tp tunnel-switchingD、enable l2tp tunnel switching
Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption
Which two statements are TRUE regarding Coherence Indexes ? ()A、 indexes are maintained by cache entry ownesB、 an application should not suggest an index that another aplication had suggestedC、 indexes cannot be sortedD、 each application using Coherence may suggest the same set of indexes when it starts
单选题There are two classes of vessels which,to the extent necessary to carry out their work,do not have to comply with the rule regarding traffic separation schemes. One of these is a vessel().Aengaged in fishing in a traffic laneBservicing a submarine cableCtowing anotherDengaged on pilotage duty
多选题Which two are true regarding external tables? ()AExternal tables can be updated.BExternal tables are read-only tables.CIndexes can be created on external tables.DIndexes cannot be created on external tables.
多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC
多选题Regarding L2TP, in which two situations is a service module or service IOA required?() (Choose two.)Aalways for LNSBalways for LACCLAC with fragmentation in the tunnelDLNS when there are greater than 2000 sessions
单选题Which CLI command displays the active L2TP sessions on an LAC?()Ashow subscriberBshow l2tp tunnelCshow l2tp sessionDshow tunnel session
多选题Which two statements are true about L2TP tunnel switching?()ARequires only one tunnel switching license.BRequires two licenses, one for inbound and one for outbound sessions.CEnabled automatically when the BSR is configured as an LAC and LNS.DAids in L2TP tunnel scaling.
多选题Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)ALDP uses Down Stream On Demand.BRSVP uses Down Stream On Demand.CLDP uses Down Stream Unsolicited.DRSVP uses Down Stream Unsolicited.
多选题Which two statements are true regarding L2TP? ()(Choose two.)ATunnels are initiated by the LACBTunnels are initiated by the LNSCBy default, subscriber authentication occurs on the LNSDBy default, subscriber authentication occurs on the LAC
多选题Which two statements regarding firewall user authentication client groups are true?() (Choose two.)AA client group is a list of clients associated with a group.BA client group is a list of groups associated with a client.CClient groups are referenced in security policy in the same manner in which individual clients are referenced.DClient groups are used to simplify configuration by enabling firewall user authentication without security policy.
多选题Which two statements are true regarding single row functions?()AThey accept only a single argumentBThey can be nested only to two levelsCArguments can only be column values or constantsDThey always return a single result row for every row of a queried tableEThey can return a data type value different from the one that is referenced
多选题Which two statements are true about L2TP tunnel switching?()ARequires only one tunnel switching license.BRequires two licenses,one for inbound and one for outbound sessions.CEnabled automatically when the BSR is configured as an LAC and LNS.DAids in L2TP tunnel scaling
多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
多选题Which two statements are true regarding high-availability chassis clustering?()AA chassis cluster consists of two devices.BA chassis cluster consists of two or more devices.CDevices participating in a chassis cluster can be different models.DDevices participating in a chassis cluster must be the same models