Which two statements are correct about Nonstop Forwarding?()A、It allows the standby RP to take control of the device after a hardware or software fault on the active RP.B、It is a Layer 3 function that works with SSO to minimize the amount of time a network is unavailable tousers following a switchover.C、It is supported by the implementation of EIGRP, OSPF, RIPv2, and BGP protocols.D、It synchronizes startup configuration, startup variables, and running configuration.E、The main objective of NSF is to continue forwarding IP packets following a switchover.F、Layer 2 802.1w or 802.1s must be used, as 802.1d cannot process the Layer 2 changes.G、Routing protocol tuning parameters must be the same as the NSF parameters, or failover will beinconsistent.

Which two statements are correct about Nonstop Forwarding?()

  • A、It allows the standby RP to take control of the device after a hardware or software fault on the active RP.
  • B、It is a Layer 3 function that works with SSO to minimize the amount of time a network is unavailable tousers following a switchover.
  • C、It is supported by the implementation of EIGRP, OSPF, RIPv2, and BGP protocols.
  • D、It synchronizes startup configuration, startup variables, and running configuration.
  • E、The main objective of NSF is to continue forwarding IP packets following a switchover.
  • F、Layer 2 802.1w or 802.1s must be used, as 802.1d cannot process the Layer 2 changes.
  • G、Routing protocol tuning parameters must be the same as the NSF parameters, or failover will beinconsistent.

相关考题:

Which of the following statements about ORACLE is (are) correct?Ⅰ.ORACLE follows SQL standardⅡ.ORACLE database defines two logical types: table and viewA.ⅠonlyB.Ⅱ onlyC.Ⅰ and ⅡD.none of the above

Examine the structure of the EMPLOYEES, DEPARTMENTS, and LOCATIONS tables.Which two SQL statements produce the name, department name, and the city of all the employees who earn more then 10000?() A.B.C.D.

Which two statements are true about pool-based source NAT? ()(Choose two.) A. PAT is not supported.B. PAT is enabled by default.C. It supports the address-persistent configuration option.D. It supports the junos-global configuration option.

Which two statements are true about AH?() (Choose two.) A. AH provides data integrity.B. AH is identified by IP protocol 50.C. AH is identified by IP protocol 51.D. AH cannot work in conjunction with ESP

Which two statements are true with regard to policy ordering? ()(Choose two.) A. The last policy is the default policy, which allows all traffic.B. The order of policies is not important.C. New policies are placed at the end of the policy list.D. The insert command can be used to change the order.

Which two statements regarding symmetric key encryption are true?() (Choose two.) A. The same key is used for encryption and decryption.B. It is commonly used to create digital certificate signatures.C. It uses two keys: one for encryption and a different key for decryption.D. An attacker can decrypt data if the attacker captures the key used for encryption.

Which two statements are true about precedence values in policy?() (Choose two.) A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.

Which two statements are true regarding L2TP? ()(Choose two.) A. Tunnels are initiated by the LACB. Tunnels are initiated by the LNSC. By default, subscriber authentication occurs on the LNSD. By default, subscriber authentication occurs on the LAC

Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

Which two statements accurately describe an IBGP peering session?() (Choose two.)A、Peers are statically defined.B、Peers exist within the same AS.C、Peers must be directly connected to each other.D、Peers advertise routes learned from other IBGP neighbors.

Which two of these statements best describe the benefits of WPAv1? ()A、 SSID broadcast preventionB、 Improved mutual authenticationC、 Improved encryption through AESD、 Improved protection against sniffing initialization vectorsE、 RF jamming prevention

Which two of these statements best describe fast secure roaming? (Choose two.)()  A、 available only in autonomous APsB、 available in autonomous and lightweight APsC、 a feature of WDS in autonomous APsD、 a feature of WDS in lightweight APsE、 requires at least one AP and one Wireless LAN Services Module

Which of the following statements are true?() A、 The equals() method determines if reference values refer to the same object.B、 The == operator determines if the contents and type of two separate objects match.C、 The equals() method returns true only when the contents of two objects match.D、 The class File overrides equals() to return true if the contents and type of two separate objects match.

Which two statements are true regarding high-availability chassis clustering?()A、A chassis cluster consists of two devices.B、A chassis cluster consists of two or more devices.C、Devices participating in a chassis cluster can be different models.D、Devices participating in a chassis cluster must be the same models

Which two statements are true regarding L2TP? ()(Choose two.)A、Tunnels are initiated by the LACB、Tunnels are initiated by the LNSC、By default, subscriber authentication occurs on the LNSD、By default, subscriber authentication occurs on the LAC

Which two statements are true about pool-based source NAT? ()(Choose two.)A、PAT is not supported.B、PAT is enabled by default.C、It supports the address-persistent configuration option.D、It supports the junos-global configuration option.

Which two statements are true regarding subqueries? ()A、A subquery can retrieve zero or more rows B、Only two subqueries can be placed atone level C、A subquery can be used only in SQL query statements D、A subquery can appear on either side of a comparison operator E、There is no limit on the number of subquery levels in the WHERE clause of a SELECT statement

Which two statements are true about standard database auditing()A、DDL statements can be audited.B、Statements that refer to stand-alone procedure can be audited.C、Operations by the users logged on as SYSDBA cannot be audited.D、Only one audit record is ever created for a session per audited statement even though it is executedmore than once.

Which two statements are true regarding the USING and ON clauses in table joins?()A、Both USING and ON clauses can be used for equijoins and nonequijoins B、Amaximum of one pair of columns can be joined between two tables using the ON clause C、The ON clause can be used to join tables on columns that have different names but compatible data types D、The WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause

多选题Which two statements are true with regard to policy ordering? ()(Choose two.)AThe last policy is the default policy, which allows all traffic.BThe order of policies is not important.CNew policies are placed at the end of the policy list.DThe insert command can be used to change the order.

多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

多选题Which two of these statements best describe the benefits of WPAv2? (Choose two.)()ASSID broadcast preventionBman-in-the-middle attack protectionCcost reduction through software upgrades in all existing hardwareDdynamic key generationERF jamming prevention

多选题Which two statements are true regarding the USING and ON clauses in table joins?()ABoth USING and ON clauses can be used for equijoins and nonequijoinsBAmaximum of one pair of columns can be joined between two tables using the ON clauseCThe ON clause can be used to join tables on columns that have different names but compatible data typesDThe WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause

多选题Which two statements are reserved words in Java?()ARunBImportCDefaultDImplement

多选题Which two statements are true about AH?() (Choose two.)AAH provides data integrity.BAH is identified by IP protocol 50.CAH is identified by IP protocol 51.DAH cannot work in conjunction with ESP

多选题Which two statements are true regarding L2TP? ()(Choose two.)ATunnels are initiated by the LACBTunnels are initiated by the LNSCBy default, subscriber authentication occurs on the LNSDBy default, subscriber authentication occurs on the LAC

多选题Which two statements are true about traffic shaping?()AOut-of-profile packets are queued.BIt causes TCP retransmits.CMarking/remarking is not supported.DIt does not respond to BECN and ForeSight Messages.EIt uses a single/two-bucket mechanism for metering.

多选题Which two statements are true regarding high-availability chassis clustering?()AA chassis cluster consists of two devices.BA chassis cluster consists of two or more devices.CDevices participating in a chassis cluster can be different models.DDevices participating in a chassis cluster must be the same models