单项选择题
A. B. C. D.
What are two characteristics of the RED algorithm as im...
多项选择题What are two characteristics of the RED algorithm as implemented in JUNOS software?()
A. It profiles based on bandwidth. B. It profiles based on loss priority. C. It prevents traffic loss through buffering. D. It prevents global synchronization with tail drops.
What is the maximum suppress time for a damped route, b...
单项选择题What is the maximum suppress time for a damped route, by default?()
A. 5 minutes B. 30 minutes C. 60 minutes D. 90 minutes
A company is using RADIUS to authenticate login request...
单项选择题A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()
A. authentication-order radius; B. authentication-order password; C. authentication-order [radius password]; D. authentication-order [password radius];