Which two steps are performed when configuring a zone?()
第1题:
What are two step needed to define a QoS policy for a traffic class?()
第2题:
What are two steps needed to define a QoS policy for a traffic class?()
第3题:
Which two statements describe the purpose of a security policy?()
第4题:
Users can define policy to control traffic flow between which two components?()
第5题:
Regarding secure tunnel (st) interfaces, which statement is true?()
第6题:
Users can define policy to control traffic flow between which two components? ()(Choose two.)
第7题:
Regarding zone types, which statement is true?()
第8题:
Your company, A. Datum Corporation, has a single Active Directory domain named intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2 operating system. The domain controllers also run DNS servers. The intranet.adatum.com DNS zone is configured as an Active Directoryintegrated zone with the Dynamic updates setting configured to Secure only. A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by domain controllers or member servers. You need to configure the intranet.adatum.com zone to meet the new security policy requirement. Which two actions should you perform()
第9题:
Your company has two domain controllers that are configured as internal DNS servers. All zones on The safer , easier way to help you pass any IT exams. 6 / 90 the DNS servers are Active Directory-integrated zones. The zones allow all dynamic updates. You discover that the contoso.com zone has multiple entries for the host names of computers that do not exist. You need to configure the contoso.com zone to automatically remove expired records. What should you do()
第10题:
A security zone can contain one or more interfaces.
A security zone can contain interfaces in multiple routing instances.
A security zone must contain two or more interfaces.
A security zone must contain bridge groups.
第11题:
You cannot assign an interface to a functional zone.
You can specifiy a functional zone in a security policy.
Security zones must have a scheduler applied.
You can use a security zone for traffic destined for the device itself.
第12题:
You cannot assign st interfaces to a security zone.
You cannot apply static NAT on an st interface logical unit.
st interfaces are optional when configuring a route-based VPN
A static route can reference the st interface logical unit as the next-hop
第13题:
Which type of zone is used by traffic transiting the device?()
第14题:
In the Junos OS, which statement is true?()
第15题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
第16题:
Which statement describes a security zone?()
第17题:
You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()
第18题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第19题:
Your company, A. Datum Corporation, has a single Active Directory domain named intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2 operating system. The domain controllers also run DNS servers. The intranet.adatum.com DNS zone is configured as an Active Directory-integrated zone with the Dynamic updates setting configured to Secure only. A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by domain controllers or member servers. You need to configure the intranet.adatum.com zone to meet the new security policy requirement. Which two actions should you perform()
第20题:
Your company has two domain controllers that are configured as internal DNS servers. All zones on the DNS servers are Active Directory-integrated zones. The zones allow all dynamic updates. You discover that the contoso.com zone has multiple entries for the host names of computers that do not exist. You need to configure the contoso.com zone to automatically remove expired records. What should you do()
第21题:
Determine a minimum bandwidth guarantee.
Determine interfaces to which to apply policy.
Assign priorities to the class.
Configure access control lists.
第22题:
[edit security idp]
[edit security zones security-zone trust interfaces ge-0/0/0.0]
[edit security zones security-zone trust]
[edit security screen]
第23题:
Define a default policy for the zone.
Assign logical interfaces to the zone.
Assign physical interfaces to the zone.
Define the zone as a security or functional zone