READ Free Dumps For Juniper- JN0-332
Question ID 12272 | Which two statements regarding symmetric key encryption are true? (Choose two.) |
Option A | The same key is used for encryption and decryption. |
Option B | It is commonly used to create digital certificate signatures. |
Option C | It uses two keys: one for encryption and a different key for decryption. |
Option D | An attacker can decrypt data if the attacker captures the key used for encryption. |
Correct Answer | A,D |
Question ID 12273 | Click the Exhibit button. Given the configuration shown in the exhibit, which protocol(s) are allowed to communicate |
Option A | RIP |
Option B | OSPF |
Option C | BGP and RIP |
Option D | RIP and PIM |
Correct Answer | A |