signature
anomaly
trojan
virus
chain
What are three valid LDP message types? ()(Choose three.)A、peer discoveryB、label distributionC、path initializationD、session managementE、connection establishment
点击查看答案
What are three Juniper DX Cluster benefits?() (Choose three.)A、performanceB、authorizationC、compressionD、protocol validationE、UDP load balancing
What are three valid Juniper Networks IPS attack object types?() (Choose three.)A、signatureB、anomalyC、trojanD、virusE、chain
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
Which three types of integration does the Business Event System support?() (Choose three.)A、point-to-pointB、parent/child messagingC、messaging hub systemD、distributed applications messagingE、simple object access protocol (SOAP) messaging
多选题Which of the following are types of flow control (Choose three.)()。AbufferingBcut-throughCwindowingDcongestion avoidanceEload balancing
多选题Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN (Choose three.)()。AHDLCBEthernetCToken RingDPPPEFDDIFFrame Relay