A network administrator repeatedly receives support calls about network issues. After investigating the issues, the administrator finds that the source NAT pool is running out of addresses.To be notified that the pool is close to exhaustion, what should the administrator configure?()A、Use the pool-utilization-alarm raise-threshold under the security nat source stanza.B、Use a trap-group with a category of services under the SNMP stanza.C、Use an external script that will run a show command on the SRX Series device to see when the pool is close to exhaustion.D、Configure a syslog message to trigger a notification when the pool is close to exhaustion.
A network administrator repeatedly receives support calls about network issues. After investigating the issues, the administrator finds that the source NAT pool is running out of addresses.To be notified that the pool is close to exhaustion, what should the administrator configure?()
- A、Use the pool-utilization-alarm raise-threshold under the security nat source stanza.
- B、Use a trap-group with a category of services under the SNMP stanza.
- C、Use an external script that will run a show command on the SRX Series device to see when the pool is close to exhaustion.
- D、Configure a syslog message to trigger a notification when the pool is close to exhaustion.
相关考题:
Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A Web server with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. The Web server is attached to the ge-0/0/0.0 interface of your device. You must use NAT to make the Web server reachable from the Internet using port translation.Which type of NAT must you configure?()A. source NAT with address shiftingB. pool-based source NATC. static destination NATD. pool-based destination NAT
A network administrator repeatedly receives support calls about network issues. After investigating the issues, the administrator finds that the source NAT pool is running out of addresses.To be notified that the pool is close to exhaustion, what should the administrator configure?()A. Use the pool-utilization-alarm raise-threshold under the security nat source stanza.B. Use a trap-group with a category of services under the SNMP stanza.C. Use an external script that will run a show command on the SRX Series device to see when the pool is close to exhaustion.D. Configure a syslog message to trigger a notification when the pool is close to exhaustion.
Click the Exhibit button.Which type of source NAT is configured in the exhibit?() A. static source poolB. interface source poolC. source pool with PATD. souce pool without PAT
An administrator receives a contract for a server install at a new building. Which of the followingshould be completed after installing the server?() A. Log the administrator password usedB. Test the air temperatureC. Update the network diagramD. Review the evacuation procedures
Which of the following should an administrator do after running a command from the console onthe perimeter router?() A. Update the configuration logsB. Update the network wiring schematicsC. Update the network configuration proceduresD. Compare the configuration with the baseline
Refer to the exhibit. A network administrator has configured DHCP services on the router asshown. DHCP clients connected to the FastEthernet0/0 interface are working properly. DHCP clients connected to the FastEthernet0/1 interface are not receiving addresses.Which two statements contain recommendations that will solve the problem?()A.The network shown in the output under the ip dhcp pool Central command should be changed to network 10.10.0.0 with a mask of 255.255.255.0B.A second DHCP pool for network 10 .10.0.0/24 should be configuredC.An ip dhcp excluded - address global configuration command for network 10.10.0.0/24 should be issuedD.The ip helper -address 10.0.0.1 command should be issued so that the address can be added to the Fast Ethernet0/0 c onfigurationE.The ip helper -address 10.0.0.1 command should be issued so that the address can be added to the Fast Ethernet0/1 configuration
Refer to the exhibit. What command sequence will enable PAT from the inside to outside network?() A.(config) ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overloadB.(config-if) ip nat outside overloadC.(config) ip nat inside source list 1 interface ethernet1 overloadD.(config-if) ip nat inside overload
管理员在交换机设置某条指令的时候,出现下述错误,Error:The network section should be within the subnet of the pool.则最可能执行的指令是( )A.[Huawei-ip-pool-x]network 192.168.1.1 mask 24 [Huawei-ip-pool-x]gateway-list 192.168.2.2B.[Huawei-ip-pool-x]network 192.168.1.1 mask 24 [Huawei-ip-pool-x]dns-list 192.168.2.2C.[Huawei-ip-pool-x]network 192.168.1.1 mask 24 [Huawei-ip-pool-x]lease day 1000D.[Huawei-ip-pool-x]network 192.168.1.1 mask 24 [Huawei-ip-pool-x]next-server 192.168.2.2
An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway?空白(5)处应选择()A、pathwaysB、routersC、diagramsD、calls
Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A Web server with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. The Web server is attached to the ge-0/0/0.0 interface of your device. You must use NAT to make the Web server reachable from the Internet using port translation. Which type of NAT must you configure?()A、source NAT with address shiftingB、pool-based source NATC、static destination NATD、pool-based destination NAT
You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place. Who can authorize the DHCP servers?()A、 Chief information officerB、 IT support staff in BostonC、 IT support staff in New YorkD、 Network administrator in ChicagoE、 Network administrator in New York
Which of the following should an administrator do after running a command from the console onthe perimeter router?()A、Update the configuration logsB、Update the network wiring schematicsC、Update the network configuration proceduresD、Compare the configuration with the baseline
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable
An administrator receives a contract for a server install at a new building. Which of the followingshould be completed after installing the server?()A、Log the administrator password usedB、Test the air temperatureC、Update the network diagramD、Review the evacuation procedures
Which type of source NAT is configured in the exhibit?() [edit security nat destination] user@host# show pool A { address 10.1.10.5/32; } rule-set 1 { from zone untrust; rule 1A { match { destination-address 100.0.0.1/32; } then { destination-nat pool A; } } }A、static destination NATB、static source NATC、pool-based destination NAT without PATD、pool-based destination NAT with PAT
A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()A、The host needs to open the telnet port.B、The host needs a route for the translated address.C、The administrator must use a proxy-arp policy for the translated address.D、The administrator must use a security policy, which will allow communication between the zones.
A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)A、Use the custom application feature.B、Configure static NAT for the host.C、Use port address translation (PAT).D、Use the address-persistent option.
Which type of source NAT is configured in the exhibit?() [edit security nat source] user@host# show rule-set 1 { from interface ge-0/0/2.0; to zone untrust; rule 1A {match { destination-address 1.1.70.0/24; } then { source-nat interface; } } }A、interface-based source NATB、static source NATC、pool-based source NAT with PATD、pool-based source NAT without PAT
Your network contains a Windows Server 2008 server that has the Web Server (IIS) server role installed. You have a Web application that uses a custom application pool. The application pool is set to recycle every 1,440 minutes. The Web application does not support multiple worker processes. You need to configure the application pool to ensure that users can access the Web application after the application pool is recycled. What should you do?()A、Set the Shutdown Executable option to True.B、Set the Process Orphaning Enabled option to True.C、Set the Disable Overlapped Recycling option to True.D、Set the Disable Recycling for Configuration Changes option to True.
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. A Windows Server 2008 server is included by your network and the WebServer (IIS) server role is installed on Windows Server 2008. There is a Web application which a customapplication pool is utilized. The company set the application pool to recycle every 1,440 minutes. Multipleworker processes are not supported by the Web application. Since you are the technical support, you arerequired to have the application pool configured so as to make sure that the Web application is available tousers after the application pool is recycled. Which action should be performed to achieve the goal?()A、To achieve the goal, the Disable Recycling for Configuration Changes option should be set to True.B、To achieve the goal, the Shutdown Executable option should be set to True.C、To achieve the goal, the Process Orphaning Enabled option should be set to True.D、To achieve the goal, the Disable Overlapped Recycle option should be set to True.
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.
You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. You are running a training exercise for junior administrators. You are currently discussing printer pooling.Which of the following is TRUE with regards to printer pooling?()A、Printers in a pool must be of the same model, and use the same printer driverB、Each printer in the pool must have a different printer driver.C、Printer ports used in the pool must be of the same typeD、The types of printer ports used in the pool must be mixed.E、Pooled printers appear to workstations as a single printer.F、A minimum of three printers are required to configure a printer pool.
单选题You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place. Who can authorize the DHCP servers?()A Chief information officerB IT support staff in BostonC IT support staff in New YorkD Network administrator in ChicagoE Network administrator in New York
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()ADefault gatewayBThe ports on the switchCPort security on the server's switch portDEthernet cable
单选题Click the Exhibit button. Which type of source NAT is configured in the exhibit?()A static source poolB interface source poolC source pool with PATD souce pool without PAT
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A Default gatewayB The ports on the switchC Port security on the servers switch portD Ethernet cable
单选题A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()AThe host needs to open the telnet port.BThe host needs a route for the translated address.CThe administrator must use a proxy-arp policy for the translated address.DThe administrator must use a security policy, which will allow communication between the zones.