多选题What are two valid actions for routing policy?()AdiscardBnext policyCacceptDignore

多选题
What are two valid actions for routing policy?()
A

discard

B

next policy

C

accept

D

ignore


参考解析

解析: 暂无解析

相关考题:

Click the Exhibit button.What are two valid reasons for the output shown in the exhibit?() (Choose two.) A. The local Web-filtering daemon is not enabled or is not running.B. The integrated Web-filtering policy server is not reachable.C. No DNS is configured on the SRX Series device.D. No security policy is configured to use Web filtering.

What are two components of the Junos software architecture? ()(Choose two.) A. Linux kernelB. routing protocol daemonC. session-based forwarding moduleD. separate routing and security planes

What are two valid Cluster load balancing methods? ()(Choose two.) A. urlhashB. backup chainingC. least connectionsD. fewest outstanding requests

Which two statements are true regarding routing policy processing?() A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.C. Polices are evaluated based on the order in which they are applied to a routing protocol.D. Policy processing stops once the last statement in the policy is evaluated.

Which two policy actions are considered flow control actions?() A.rejectB.community addC.next termD.next policy

What are two valid actions for routing policy?() A. discardB. next policyC. acceptD. ignore

What does RPL stand for?()A、routing primary languageB、routing policy languageC、routing police languageD、routing program languageE、routing protocol language

What are two reasons why a route might be hidden?()A、route preferenceB、routing loopC、invalid next hopD、routing policy

What are two components of the Junos software architecture? ()(Choose two.)A、Linux kernelB、routing protocol daemonC、session-based forwarding moduleD、separate routing and security planes

What are two default routing policies on Junos devices?()A、The BGP import policy accepts all BGP routes.B、The BGP export policy rejects all active BGP routes.C、The OSPF import policy accepts all OSPF routes.D、The OSPF export policy accepts all active OSPF routes.

Which two statements are true about terms in a routing policy?()A、A routing policy cannot have more than one term.B、If a term does not contain a from statement, all routes match.C、If a term does not contain a from statement, the Junos OS will not commit.D、A then statement is not mandatory in a term.

What are two components of the JUNOS Software architecture?()A、Linux kernelB、routing protocol daemonC、session-based forwarding moduleD、separate routing and security planes

In JUNOS software, which two are methods of restricting multicast traffic beyond your domain? ()A、MSDPB、Routing policyC、Administrative scopingD、Bootstrap export policy

You are creating a destination NAT rule-set. Which two are valid for use with the from clause?()A、security policyB、interfaceC、routing-instanceD、IP address

What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()A、sign-in policyB、authentication realmsC、role restrictionsD、policy realmsE、routing policy

Which two statements are true regarding routing policy processing?()A、The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.B、Policies are evaluated from right to left as displayed in the Junos OS configuration file.C、Polices are evaluated based on the order in which they are applied to a routing protocol.D、Policy processing stops once the last statement in the policy is evaluated.

多选题Which two security policy actions are valid?()AdenyBdiscardCrejectDclose

多选题What are two default routing policies on Junos devices?()AThe BGP import policy accepts all BGP routes.BThe BGP export policy rejects all active BGP routes.CThe OSPF import policy accepts all OSPF routes.DThe OSPF export policy accepts all active OSPF routes.

多选题Which two policy actions are considered flow control actions?()ArejectBcommunity addCnext termDnext policy

多选题You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.

多选题What are two valid match criteria for a routing policy?()AOSPF area IDBprefix listCportDtime-to-live (TTL)

多选题What are two valid initial configuration methods supported on Juniper routers?()ACLIBJ-WebCJUNOScopeDPCMCIA flash card

单选题What is the default export routing policy for RIP?()AAccept all local routesBAccept all RIP routesCAccept no routesDAccept all direct routes

多选题By default, what are three valid routing tables?()Ainet.0Binet4.0Cinet.6Dinet6.0Einet.3

多选题Bye default, what are three valid routing tables? ()Ainet.0Binet4.0Cinet.6Dinet6.0Einet.3

多选题What are two valid match criteria for a routing policy? ()AOSPF are a IDBprefix listCportDtime-to-live(TTL)

多选题What are two valid Cluster load balancing methods? ()(Choose two.)AurlhashBbackup chainingCleast connectionsDfewest outstanding requests