[edit security]
[edit protocols]
[edit firewall]
[edit policy-options]
第1题:
A. [edit security]
B. [edit protocols]
C. [edit firewall]
D. [edit policy-options]
第2题:
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
A. Session-Export policies on the Junos Pulse Secure Access Service
B. Session-Export policies on the Junos Pulse Access Control Service
C. Session-Import policies on the Junos Pulse Secure Access Service
D. Session-Import policies on the Junos Pulse Access Control Service
E. Resource access policies on the Junos Pulse Access Control Service
第3题:
According to JUNOS software route selection algorithm, which IS-IS route type is most preferred?()
第4题:
Which security or functional zone name has special significance to the Junos OS?()
第5题:
You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
第6题:
Under which configuration hierarchy is an access profile configured for firewall user authentication?()
第7题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
第8题:
Alerts
Multi-Org
Flexfields
Shared entities
Business Intelligence
第9题:
Session-Export policies on the Junos Pulse Secure Access Service
Session-Export policies on the Junos Pulse Access Control Service
Session-Import policies on the Junos Pulse Secure Access Service
Session-Import policies on the Junos Pulse Access Control Service
Resource access policies on the Junos Pulse Access Control Service
第10题:
[edit security idp]
[edit security zones security-zone trust interfaces ge-0/0/0.0]
[edit security zones security-zone trust]
[edit security screen]
第11题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第12题:
Very High
High
Moderate
Low
Very Low
第13题:
A. self
B. trust
C. untrust
D. junos-global
第14题:
A. Policies and procedures
B. Encryption
C. Locked doors
D. Security personnel
E. Backup tapes
第15题:
After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()
第16题:
Which option provides a hierarchy of data security across lines of business?()
第17题:
Which of the following are examples of physical security measures?()
第18题:
In which hierarchy are routing policies defined?()
第19题:
Under which Junos hierarchy level are security policies configured?()
第20题:
Security level 1
Security level 2
Security level 3
Medium safe level
第21题:
The Junos OS drops any flow that does not match the source address or destination address.
All traffic is dropped.
All existing sessions continue.
The Junos OS does a policy re-evaluation.
第22题:
[edit security policies from-zone HR to-zone HR]
[edit security zones functional-zone management protocols]
[edit security zones protocol-zone HR host-inbound-traffic]
[edit security zones security-zone HR host-inbound-traffic protocols]
第23题:
[edit access]
[edit security access]
[edit firewall access]
[edit firewall-authentication]