多选题Which three ports does a WX device use for control traffic purposes?() (Choose three.)A3577 UDPB3578 UDPC3678 UDPD3577 TCPE3578 TCP

多选题
Which three ports does a WX device use for control traffic purposes?() (Choose three.)
A

3577 UDP

B

3578 UDP

C

3678 UDP

D

3577 TCP

E

3578 TCP


参考解析

解析: 暂无解析

相关考题:

On which three traffic types does firewall pass-through authentication work? ()(Choose three.) A. pingB. FTPC. TelnetD. HTTPE. HTTPS

Which three RIP features are supported on the WX or WXC device? ()(Choose three.) A. SHA-1B. MD5 authenticationC. version 1 messagesD. version 2 messagesE. plain-text authentication

Which three ports does a WX device use for control traffic purposes?() (Choose three.) A. 3577 UDPB. 3578 UDPC. 3678 UDPD. 3577 TCPE. 3578 TCP

Which type of lock must be granted for the WX device to perform write acceleration on CIFS traffic?() A. oplockB. block lockC. bit range lockD. byte range lock

Which database does WX Central Management System (WX CMS) software use to store historical data?() A. OracleB. MySQLC. SybaseD. Microsoft Access

Which two conditions will cause switch-to-wire to occur? ()(Choose two.) A. loss of powerB. QoS congestionC. software failure occuredD. WX device exceeded its license speedE. traffic does not match application definiton

Which three methods can you use for route discovery on a WX platform? ()(Choose three.) A. Enable RIPB. Enable OSPFC. Periodically poll any routerD. Import routes from a TFTP server

Which three QoS mechanisms can be configured to improve VoIP quality on a converged  network?()A、The use of a queuing method that will give VoIP traffic strict priority over other traffic  B、The use of RTP header compression for the VoIP traffic.C、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED for the VoIP traffic

Which three statistics does the Executive report summarize?() (Choose three.)A、latency and lossB、compression resultsC、traffic (by application)D、CRC and alignment errorsE、user access (by username)

On which three traffic types does firewall pass-through authentication work? ()(Choose three.)A、pingB、FTPC、TelnetD、HTTPE、HTTPS

Which three ports does a WX device use for control traffic purposes?() (Choose three.)A、3577 UDPB、3578 UDPC、3678 UDPD、3577 TCPE、3578 TCP

Which of the following ports does RDP use by default?()A、23B、902C、1677D、3389

Which two conditions will cause switch-to-wire to occur? ()(Choose two.)A、loss of powerB、QoS congestionC、software failure occuredD、WX device exceeded its license speedE、traffic does not match application definiton

Which three RIP features are supported on the WX or WXC device? ()(Choose three.)A、SHA-1B、MD5 authenticationC、version 1 messagesD、version 2 messagesE、plain-text authentication

Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)A、Fast Connection SetupB、TCP Acceleration (AFP)C、Network Sequence CachingD、AppFlow's MAPI accelerationE、Molecular Sequence Reduction

Which three components does the Scheduler use for managing tasks within the Oracle environment? ()(Choose three.)A、a jobB、a programC、a scheduleD、a PL/SQL procedure

多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS

多选题Which three RIP features are supported on the WX or WXC device? ()(Choose three.)ASHA-1BMD5 authenticationCversion 1 messagesDversion 2 messagesEplain-text authentication

多选题Which three methods can you use for route discovery on a WX platform? ()(Choose three.)AEnable RIPBEnable OSPFCPeriodically poll any routerDImport routes from a TFTP server

单选题Which database does WX Central Management System (WX CMS) software use to store historical data?()AOracleBMySQLCSybaseDMicrosoft Access

多选题Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)AFast Connection SetupBTCP Acceleration (AFP)CNetwork Sequence CachingDAppFlow's MAPI accelerationEMolecular Sequence Reduction

多选题Which two statements are correct about firewall filters in the Junos OS?()AFirewall filters are stateless.BFirewall filters are used to control routing information that is exchanged between devices.CFirewall filters are used to control traffic passing through the device.DFirewall filters can only be applied to traffic entering the device.

单选题Which of the following ports does RDP use by default?()A23B902C1677D3389

多选题Which three ports does a WX device use for control traffic purposes?() (Choose three.)A3577 UDPB3578 UDPC3678 UDPD3577 TCPE3578 TCP

单选题Which type of lock must be granted for the WX device to perform write acceleration on CIFS traffic?()AoplockBblock lockCbit range lockDbyte range lock

多选题Which three benefits does WX Central Management System (WX CMS) software offer WX administrators?()(Choose three.)ASupports up to 1500 WX devices.BSimplifies software deployment of WX devices.CProvides a scheduler for device management tasks.DSupport is offered for both UNIX- and Windows-based products.EProvides views of the immediate status of deployed devices and the service tunnels.

单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()AAll traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableBClients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsCAll traffic is redirected to the VLAN that the attacker used to flood the CAM tableDAll traffic is flooded out all ports and an attacker is able to capture all dataENone of the other alternatives apply

单选题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()AYou must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.BNo security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.CYou must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.DYou must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.