问题:单选题You must segement your internal 192.168.1.0/24 network into a minimun of 12 subnet, each containing a minimun of 12 hosts. Which network mask do you use?()A /26B /27C /28D /29...
查看答案
问题:单选题What represents the binary equivalence of 148?()A 10110100B 11010010C 10011100D 10010100...
问题:多选题Which two statements are true about the forwarding table?()AThe forwarding table lists each source protocol and preference for each destinationBThe forwarding table constains only active routesCThe forwarding table is used to process transit packetsDTh...
问题:多选题Which two statements are true about terms in a routing policy?()AA then statement is mandatory in a termBIf a term does not contain a from statement, all routers matchCIf a term does not contain a from statement, the Junos OS will not commitDA then sta...
问题:多选题Two devices on an Ethernet segment sent frames at the same time causing a collision. Which two statements are true?()ABoth devices stop transmiting, wait a random period of time, verify the wire is idle, and re-transmitBThe device with the lowest MAC a...
问题:单选题Which command will display the contents of the forwarding table?()A show route forwarding-tableB show forwardingC show configuration...
问题:多选题Which three protocols use UDP as a transport protocol by default?()AHTTPBTFTPCDNSDSNMPESMTP...
问题:单选题Which J-Web lab do you use lo add licenses to the device?()A ConfigureB TroubleshootC MonitorD Maintain...
问题:单选题What is the default protocol preference for OSPF internal routes?()A 10B 15C 150D 160...
问题:单选题Which statement is true about the forwarding table?()A The forwarding table is stored in the control plane onlyB The forwarding table is stored in the control plane and in the forewarding planeC The forwarding table contains both active and inactive ro...
问题:多选题Which two characteristitcs describe the UDP protocol?()Alimited error checkingBdefined timersCno recovery mechanismsDthree-way handshake...
问题:单选题What represents the binary equivalence of 96?()A 11010100B 01100000C 11010000D 11101010E 11000000...
问题:单选题Which user authenticaton method is supported by the Junos OS as the last resort alternative?()A TACACS+B RADIUSC local user databaseD enable password...
问题:多选题What are three terminating actions for firewall filters?()ArejectBdropCpermitDacceptEdiscard...
问题:单选题When configuring more than one archival site, which statement is true?()A The system will first attempt the transfer using the URL configured lastB The system will transfer the configuration to each archival siteC The system will not transfer to a seco...
问题:单选题By default, which character indicates the UNIX shell prompt?()A #B C $D %...
问题:多选题Which two fields are found in an Ethernet frame header?()ATTLBflagsCchecksumDtype...
问题:单选题What is the purpose of a network mask?()A It is used to identify the maximum hop count of a subnetworkB It is used to identify an IP address as either private or publicC It is used to identify the network to which an IP address belongsD It is used to i...