单项选择题
A.This section is where you define all chassis clustering configuration.
B.This configuration is required for members of a chassis cluster to talk to each other.
C.You can apply this configuration in the chassis cluster to make configuration easier.
D.This section is where unique node configuration is applied.
单项选择题 Based on the configuration shown in the exhibit, what are the actions of the security policy?() [edit schedulers] user@host# show scheduler now { monday all-day; tuesday exclude; wednesday { start-time 07:00:00 stop-time 18:00:00; } thursday { start-time 07:00:00 stop-time 18:00:00; } } [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps;} then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now;
单项选择题 ForIKEphase1negotiations,whenisaggressivemodetypicallyused?()
多项选择题 WhichtwostatementsaretrueregardingproxyARP?()