You are asked to configure the configuration archival featur

题目
多选题
You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?()
A

TFTP

B

FTP

C

SCP

D

SFTP

参考答案和解析
正确答案: A,D
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()

A. ICMP

B. SNMP

C. TCP

D. HTTPS


参考答案:A, C

第2题:

You would like to configure a channelized OC3 interface with the following properties:Which set of configuration commands accomplishes this goal?()

A.A

B.B

C.C

D.D


参考答案:A

第3题:

You are developing a Windows Communication Foundation (WCF) service.You must record all available information for the first 1,000 messages processed, even if they are malformed.You need to configure the message logging section of the configuration file.Which configuration segment should you use? ()

A.

B.

C.

D.


参考答案:A

第4题:

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()

A.19dbm

B.10dbm

C.67dbm

D.86dbm


参考答案:A

第5题:

You have been asked to configure a login class which will permit its users to view and edit the configuration. The class should only allow the configuration of the interfaces and firewall heirarchies. Which configuration correctly accomplishes this?()

A.A

B.B

C.C

D.D


参考答案:B

第6题:

You are asked to configure the configuration archival feature on your Junos devices.Which two transfer methods are available?()

A. TFTP

B. FTP

C. SCP

D. SFTP


参考答案:B, C

第7题:

You would like to configure an Ethernet interface with the following characteristics:Which set of configuration commands accurately completes this task?()

A.A

B.B

C.C

D.D


参考答案:B

第8题:

Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()

A.

B.

C.

D.


参考答案:A

第9题:

You have a computer that runs Windows Vista.You need to configure the computer to meet the following requirements:·You must be able to make configuration changes remotely.·You must be able to make the changes without the permission of the locally logged-on user.What should you do?()

A.A

B.B

C.C

D.D


参考答案:A

第10题:

Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?()

A. Configure the switch to be in VTP client mode.

B. Configure the switch to be in VTP domaint mode.

C. Configure the switch to be in VTP transparent mode.

D. Configure the switch to be in VTPv2.


参考答案:C

更多相关问题