Exam JN0-522 Preparation Questions

Page 5

Answer: D Question: 19 Which two statements are true about symmetric key algorithms? (Choose two.) A. DH and RSA are symmetric. B. DES, 3DES, AES are symmetric. C. Symmetric key algorithms are computationally more expensive. D. Symmetric key algorithms are more suitable for bulk data transfers. Answer: B, D Question: 20 Click the Exhibit button. Which command generated the output shown in the exhibit?

A. get route B. trace-route C. get route ip D. get interface Answer: C Question: 21 Which three commands are used to verify that routing is correctly configured? (Choose three.) A. ping B. get route C. trace-route D. get session E. get interface Answer: A, B, C Question: 22 Click the Exhibit button. Which order of policies would allow all five policies to be effective in matching traffic? (Note: The numbers in the answer choices below refer to the policy ID numbers shown in the exhibit.)

A. 3,4,2,5,1 B. 4,5,3,2,1 C. 3,2,1,5,4 D. 5,3,1,2,4 Answer: A

For Latest JN0-522 Exam Questions and study guides- visit- http://www.Examsexpert.com/ JN0-522.html


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.