Skip to Content
JUNOS Enterprise Switching
book

JUNOS Enterprise Switching

by Harry Reynolds, Doug Marschke
July 2009
Intermediate to advanced
752 pages
23h 19m
English
O'Reilly Media, Inc.
Content preview from JUNOS Enterprise Switching

Chapter Review Questions

  1. Which is true regarding MAC limiting?

    1. It is currently not supported because not learning all MAC addresses breaks bridging

    2. It can be based on an allowed list of MACs on a per-port basis

    3. It can be based on an allowed MAC number, per port

    4. It is set on a VLAN basis, not on a port basis

    5. Both B and C

  2. Which is true about ARP inspection?

    1. It requires a DHCP snooping database

    2. It can operate without DHCP snooping

    3. It prevents IP address spoofing

    4. It is configured at the port rather than VLAN level

  3. True or false: by default, all access links are considered trusted for DHCP.

  4. Which of the following are configured on a VLAN basis?

    1. ARP inspection

    2. DHCP snooping

    3. IP Source Guard

    4. All of the above

  5. Which of the following EAP methods are certificate-based?

    1. MAC

    2. EAP-MD5

    3. EAP-TLS

    4. All of the above

  6. With regard to MAC authentication, which is true?

    1. Setting MAC-based authorization automatically disables EAP

    2. Local authentication is mandatory due to the lack of EAP on a non-responsive client

    3. Local authentication is always based on per-port databases

    4. Local authentication is global and applies to all 802.1X-1X-enabled interfaces unless constrained with the interface keyword

  7. Which is the default supplicant mode?

    1. Single

    2. Single-secure

    3. Multiple

    4. None of the above

  8. What is the difference between single and multiple supplicant modes?

    1. Single supports only one client at any time

    2. Multiple supports multiple clients but only when each has been authenticated

    3. Multiple supports multiple clients but requires only one to be authenticated

    4. Both ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

JUNOS Enterprise Routing

JUNOS Enterprise Routing

Doug Marschke, Harry Reynolds
JUNOS High Availability

JUNOS High Availability

James Sonderegger, Orin Blomberg, Kieran Milne, Senad Palislamovic
Junos Security

Junos Security

Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, James Quinn

Publisher Resources

ISBN: 9780596804244Errata Page