performance
authorization
compression
protocol validation
UDP load balancing
多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects
点击查看答案
多选题What are the three main parts of a syslog message? ()(Choose three.)Aseverity levelBfacilityClog message nameDtime stampEerror codesFaccess privilege
多选题What are three factors that limit the maximum distance of an amplified optical signal without regeneration? ()(Choose three.)Afiber dispersionBsignal attenuationCtransmitter powerDamplifier bandwidthEreceiver dispersion tolerance
多选题What are three relevant design considerations when using the 15216 EDFA? ()(Choose three.)AdispersionBOptical SNRCspan attenuationDfour wave mixingEreceiver sensitivity
多选题Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com. You also discover that there is only one port rule configured for Network Load Balancing cluster. You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only. Which two actions should you perform to achieve this objective()ACreate a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleBRun the wlbs disable command on the cluster nodesCAssign a unique port rule for NLB cluster by using the NLB Cluster consoleDDelete the default port rules through Network Load Balancing Cluster console
多选题What are three components of the NET address? ()(Choose three.)AArea IDBN-selectorCSystem IDDISO numberEMAC address
多选题What are three valid Juniper Networks IPS attack object types?() (Choose three.)AsignatureBanomalyCtrojanDvirusEchain