You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?()A、TFTPB、FTPC、SCPD、SFTP

You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?()

  • A、TFTP
  • B、FTP
  • C、SCP
  • D、SFTP

相关考题:

You are developing a Windows Communication Foundation (WCF) service.You must record all available information for the first 1,000 messages processed, even if they are malformed.You need to configure the message logging section of the configuration file.Which configuration segment should you use? ()A.B.C.D.

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()A. CLIB. WebUIC. NSMD. Junos Pulse Access Control Service

When configuring more than one archival site, which statement is true?() A. The system will first attempt the transfer using the URL configured lastB. The system will transfer the configuration to each archival siteC. The system will not transfer to a secondary site unless the previous site failsD. The system will transfer using secure copy protocol (SCP) before attempting FTP

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS

In JUNOS software, which two are methods of restricting multicast traffic beyond your domain? () A. MSDPB. Routing policyC. Administrative scopingD. Bootstrap export policy

You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?() A. TFTPB. FTPC. SCPD. SFTP

You have been asked to configure a login class which will permit its users to view and edit the configuration. The class should only allow the configuration of the interfaces and firewall heirarchies. Which configuration correctly accomplishes this?()A.AB.BC.CD.D

You are the administrator of two Microsoft Windows 2000 advanced server computers. On these servers, you are configuring a database that will store accounting information for your company.The data must be available at all times. Interruptions in data connectivity should not last longer than five minutes. Any changes to the database should not require you to reconfigure the client computers.How should you configure the database?A.Configure the database on the two servers as a SQL Server 2000 cluster.B.Configure the database on one server, and then configure a standby database on the second server.C.Configure the database on each server. Use Microsoft Distributed Transaction Coordinator to keep the two servers perfectly synchronized.D.Configure the database as a federated database, and then partition half the data on each server.

Which three statements best describe HSRP configuration on Cisco Nexus switches?()A、 In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.B、 In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.C、 You can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.D、 You can use the show standby command to verify HSRP operation and configuration.E、 If you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.

You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()A、the Pulse Diagnostics Tool in the "File" "Tools" menu option in the Pulse GUIB、the Pulse Diagnostics Tool in the "Start" "All Programs" "Juniper Networks" "Junos Pulse" menu folder next to the Junos Pulse applicationC、the Pulse Diagnostics Viewer, which you access by simultaneously pressing "Ctrl" and "F2"D、the Pulse Diagnostics Viewer in the "File" "Tools" menu option in the Pulse GUI

You are maintaining a database that is in ARCHIVELOG mode. You have configured the flash recovery area in your database. The database is in MOUNT EXCLUSIVE mode, and you want to configure the Flashback Database feature. Which two options are NOT required to configure the Flashback Database feature? ()A、 Open the database in read-only mode.B、 Set the retention target with the DB_FLASHBACK_RETENTION_TARGET initialization parameter.C、 Enable the block change tracking feature.D、 Execute the ALTER DATABASE FLASHBACK ON statement.

You want to use the Flashback Transaction Query feature to identify all the changes made to your database within a specific time period. What is a prerequisite for using the Flashback Transaction Query feature?()A、 You must use automatic undo management in the database.B、 You must configure OMF in your database.C、 You must configure ASM for storing the datafiles.D、 You must multiplex the online redo log file.

You enable the Windows Sidebar feature on your computer. You discover that you are unable to access the desktop icons that appear beneath the Windows Sidebar feature. You need to access these desktop icons.  What are two possible ways to achieve this goal?()A、Close the Windows Sidebar feature.B、Move all the Windows Sidebar gadgets to the desktop.C、Move the Windows Sidebar feature to the opposite side.D、Remove all gadgets from the Windows Sidebar feature.E、Configure the Windows Sidebar feature to bring all gadgets to the front.

You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()A、user@router request system storage cleanupB、user@router show system storageC、user@router request system storage cleanup dry-runD、user@router show system storage detail

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

When configuring more than one archival site, which statement is true?()A、The system will first attempt the transfer using the URL configured lastB、The system will transfer the configuration to each archival siteC、The system will not transfer to a secondary site unless the previous site failsD、The system will transfer using secure copy protocol (SCP) before attempting FTP

In JUNOS software, which two are methods of restricting multicast traffic beyond your domain? ()A、MSDPB、Routing policyC、Administrative scopingD、Bootstrap export policy

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()A、CLIB、WebUIC、NSMD、Junos Pulse Access Control Service

A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()A、Configure a Max Threads Constraint and add your application to the list of applications for the  Constraint.B、Configure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and  configuration your application to use the Work Manager.C、Configure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and  configure your application to use the Work Manager.D、Configure a global MaxThreads constraint and target it to the server or clusters where your  application is deployed.E、Configure the startup parameter "-Dwls-maxThreads" to be the same as the number of  database connections configured.

Your network contains a Web-based application that runs on Windows Server 2003. You plan to  migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server  configuration to support the Web-based application. The server configuration must meet the following  requirements:   èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs  What should you recommend?() A、Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster.B、Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster.C、Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.D、Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster.

Your company has an Active Directory Domain Services (AD DS) domain. You are installing the RD Session Host (RD Session Host) role service in Server Manager on a server that runs Windows Server 2008 R2. The Audio and video playback check box on the Configure Client Experience page is not available. You need to ensure that you can enable audio and video playback for users connecting to the RD Session Host server. Which two actions should you perform?()A、Start the Windows Audio service.B、Install the Desktop Experience feature.C、Install Connection Manager Administration Kit feature.D、Start the Windows Audio EndPoint Builder service.

Your portable computer has two 512-MB memory modules installed in the only two memory slots available.  You need to improve the speed of your computer.  What should you do? ()A、Adjust the processor scheduling to optimize for background services.B、Connect a USB flash drive to the computer. Enable the ReadyBoost feature.C、Configure the virtual memory file to exist on the same drive as the operating system.D、Configure the local security policy setting of the computer to clear the virtual page file upon shutdown.

You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully  qualified domain name. You need to access the Web server by using the fully qualified domain name.  What should you do? ()A、Use the Diagnose and repair feature in the Network and Sharing Center.B、At the command prompt, type ipconfig /allcompartments.C、Disable the NetBIOS feature on your network adapter.D、Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.

You configure your Windows 2000 Professional portable computer to redirect your My Documents folder to your home folder. You want to ensure that you can access all of your files in you’re my Documents folder when you are not connected to the network. What should you do?()A、Use Windows Explorer to enable offline files.B、Use Windows Explorer to create shortcut to access offline files folder as desktop.C、Use Windows Explorer to configure the properties of your home folder to be available offline.D、Use synchronization manager to configure your home folder to be available offline.E、Create a shortcut in my network places to access your home folder.

You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.  What should you do? ()A、Enable the User Account Control: Only elevate executables that are signed and validated option.B、Disable the User Account Control: Only elevate executables that are signed and validated option.C、Configure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.

单选题You want to use the Flashback Transaction Query feature to identify all the changes made to your database within a specific time period. What is a prerequisite for using the Flashback Transaction Query feature?()A You must use automatic undo management in the database.B You must configure OMF in your database.C You must configure ASM for storing the datafiles.D You must multiplex the online redo log file.

多选题You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?()ATFTPBFTPCSCPDSFTP