问题:单选题For which network anomaly does Junos provide a SCREEN?()A a telnet to port 80B a TCP packet with the SYN and ACK flags setC an SNMP getnext requestD an ICMP packet larger than 1024 bytes...
查看答案
问题:单选题Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?()A policy-rematchB policy-evaluateC rematch-policyD evaluate-policy...
问题:多选题Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)ANATBOSPFCSNMPDSCREEN options...
问题:单选题Which statement is true regarding the Junos OS for security platforms?()A SRX Series devices can store sessions in a session table.B SRX Series devices accept all traffic by default.C SRX Series devices must operate only in packet-based mode.D SRX Seri...
问题:单选题You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A [edit security...
问题:单选题What is the correct syntax for applying node-specific parameters to each node in a chassis cluster?()A set apply-groups node$B set apply-groups (node)C set apply-groups $(node)D set apply-groups (node)all...
问题:单选题Which command do you use to display the status of an antivirus database update?()A show security utm anti-virus statusB show security anti-virus database statusC show security utm anti-virus databaseD show security utm anti-virus update...
问题:单选题What is the default session timeout for TCP sessions?()A 1 minuteB 15 minutesC 30 minutesD 90 minutes...
问题:多选题Which two statements about Junos software packet handling are correct?()(Choose two.)AThe Junos OS applies service ALGs only for the first packet of a flow.BThe Junos OS uses fast-path processing only for the first packet of a flow.CThe Junos OS perfor...
问题:单选题Which Web-filtering technology can be used at the same time as integrated Web filtering on a single branch SRX Series device?()A Websense redirect Web filteringB local Web filtering (blacklist or whitelist)C firewall user authenticationD ICAP...
问题:单选题When using UTM features in an HA cluster, which statement is true for installing the licenses on the cluster members?()A One UTM cluster license will activate UTM features on both members.B Each device will need a UTM license generated for its serial n...
问题:单选题Under which Junos hierarchy level are security policies configured?()A [edit security]B [edit protocols]C [edit firewall]D [edit policy-options]...
问题:多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal...
问题:多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication...
问题:单选题Which command do you use to manually remove antivirus patterns?()A request security utm anti-virus juniper-express-engine pattern-deleteB request security utm anti-virus juniper-express-engine pattern-reloadC request security utm anti-virus juniper-exp...
问题:单选题A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()A The host needs ...
问题:多选题An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)AOnly main mode can be used for IKE negotiationBA local-identity must be definedCIt must be t...
问题:多选题Which three statements are true when working with high-availability clusters? (Choose three.)()AThe valid cluster-id range is between 0 and 255.BJunos OS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the ...