which routes will be advertised to OSPF neighbors because of the demo policy?
— Exhibit —
user@router> show route
inet.0: 9 destinations, 9 routes (9 active, 0 holddown, 0 hidden)
+ = Active Route, – = Last Active, * = Both
10.10.10.91/32 *[Direct/0] 00:09:40
> via lo0.0
10.10.10.92/32 *[OSPF/10] 00:01:50, metric 1
> to 172.16.1.2 via ge-0/0/2.0
100.100.1.0/24 *[Static/5] 00:01:50
Reject
172.16.1.0/24 *[Direct/0] 00:06:09
> via ge-0/0/2.0
172.16.1.1/32 *[Local/0] 00:06:09
Local via ge-0/0/2.0
192.168.0.0/16 *[Aggregate/130] 00:00:06
Reject
192.168.0.0/17 *[Aggregate/130] 00:00:06
> to 172.16.1.2 via ge-0/0/2.0
192.168.50.0/24 *[Static/5] 00:00:06
> to 172.16.1.2 via ge-0/0/2.0
192.168.51.0/24 *[Static/5] 00:00:06
> to 172.16.1.2 via ge-0/0/2.0
user@router> show configuration policy-options
policy-statement demo {
term 1 {
from {
protocol aggregate;
route-filter 192.168.0.0/16 longer;
}
then accept;
}}
user@router> show configuration protocols ospf
export demo;
area 0.0.0.0 {
interface ge-0/0/2.0;
}
Given the configuration and routing table shown in the exhibit, which routes will be
advertised to OSPF neighbors because of the demo policy?
what is the next step after configuring the system to boot into singleuser mode?
During a password recovery, what is the next step after configuring the system to boot into singleuser mode?
Which three match criteria must each security policy include?
Which three match criteria must each security policy include? (Choose three.)
what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?
user@router> show configuration firewall
family inet {
filter demo {
term example {
from {
source-address {
100.100.100.0/24;
}
destination-address {
200.200.200.0/24;
}}
then {
reject;
}}
term testing {
from {
source-address {
10.10.10.0/28;
}
destination-address {
200.200.200.0/24;
}}
then sample;
}
term results {
from {
address {
200.200.200.0/24;
}}
then accept;
}
term final {
then policer LAPD;
}}}
Given the configuration shown in the exhibit, what will happen to traffic from source
10.10.10.25 destined to 200.200.200.1?
Which statement is true regarding the password-recovery process?
Which statement is true regarding the password-recovery process?
Which three IP option fields can an attacker exploit to cause problems in a network?
Which three IP option fields can an attacker exploit to cause problems in a network?
(Choose three.)
which routes will be advertised to OSPF neighbors because of the demo policy?
user@router> show route
inet.0: 9 destinations, 9 routes (9 active, 0 holddown, 0 hidden)
+ = Active Route, – = Last Active, * = Both
10.10.10.91/32 *[Direct/0] 00:09:40
> via lo0.0
10.10.10.92/32 *[OSPF/10] 00:01:50, metric 1
> to 172.16.1.2 via ge-0/0/2.0
100.100.1.0/24 *[Static/5] 00:01:50
Reject
172.16.1.0/24 *[Direct/0] 00:06:09
> via ge-0/0/2.0
172.16.1.1/32 *[Local/0] 00:06:09
Local via ge-0/0/2.0
192.168.0.0/16 *[Aggregate/130] 00:00:06
Reject
192.168.0.0/17 *[Aggregate/130] 00:00:06
> to 172.16.1.2 via ge-0/0/2.0
192.168.50.0/24 *[Static/5] 00:00:06
> to 172.16.1.2 via ge-0/0/2.0
192.168.51.0/24 *[Static/5] 00:00:06
> to 172.16.1.2 via ge-0/0/2.0
user@router> show configuration policy-options
policy-statement demo {
term 1 {
from {
route-filter 192.168.0.0/16 longer accept;
}
then reject;
}}
user@router> show configuration protocols ospf
export demo;
area 0.0.0.0 {
interface ge-0/0/2.0;
}
Given the configuration and routing table shown in the exhibit, which routes will be
advertised to OSPF neighbors because of the demo policy?
What is the role of route preference?
What is the role of route preference?
Which statement is true about implementing IP spoofing protection as a Junos Screen option?
Which statement is true about implementing IP spoofing protection as a Junos Screen
option?
what is the function of the protect-loopback filter?
[edit interfaces]
user@router# show
…
lo0 {
unit 0 {
family inet {
filter {
input protect-loopback;
}
address 192.168.100.1/32;
}}}
Given the configuration shown in the exhibit, what is the function of the protect-loopback
filter?