[edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }
第1题:
A. [edit security idp]
B. [edit security zones security-zone trust interfaces ge-0/0/0.0]
C. [edit security zones security-zone trust]
D. [edit security screen]
第2题:
What is true about IP Source Guard with port security?()
第3题:
What is the correct procedure for adding an access point in WCS?()
第4题:
Which of the following commands will enable you to see the contents of the IP routing table andsend the output to a TFTP server at the same time?()
第5题:
Which configuration shows the correct application of a security policy scheduler?()
第6题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第7题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
第8题:
You are configuring the DX appliance for the first time using the console. Which two configurationvalues can be set using the first time configuration screen?() (Choose two.)
第9题:
An important tablespace of your database is dropped by mistake. You use the Flashback Database feature to retrieve the tablespace. You perform the following steps to retrieve the tablespace: 1. You log on to Enterprise Manager as SYSDBA. 2. You select the maintenance screen. 3. You choose Perform Recovery option on the maintenance screen. 4. You choose Whole Database in the Object Type drop-down list Perform Recovery: Type screen. 5. You choose Recover to Current Time from the Operation Type on the Perform Recovery: Type screen. 6. You provide the Host Credentials for a database user. on the Perform Recovery: Type screen. 7. You click the continue button. An information screen appears saying that the database is unavailable. What is this information screen?()
第10题:
Your computer hardware supports Microsoft Windows Aero Experience. The transparency feature does not appear to be enabled. You need to use the transparency feature. What are the two possible ways to achieve this goal? ()
第11题:
[edit security idp]
[edit security zones security-zone trust interfaces ge-0/0/0.0]
[edit security zones security-zone trust]
[edit security screen]
第12题:
A
B
C
D
第13题:
A. the user role
B. the ether0 IP address
C. the default route for this DX appliance
D. the address of a network TFTP server
第14题:
You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?()
第15题:
Which two statements about the use of SCREEN options are correct? ()(Choose two.)
第16题:
Which of the following commands shows all routes learned via EIGRP?(Choose all that apply.)()
第17题:
Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()
第18题:
You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()
第19题:
You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.)
第20题:
Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()
第21题:
Your company has an Active Directory domain. You have a server that runs Windows Server 2008. The Terminal Services role is installed on the server. The company security policy does not allow users to copy and paste information to a local computer during a Terminal Services session. You deploy the remote application named APP1. You need to configure Terminal Services to meet the security requirement. What should you do?()
第22题:
the log option for the particular SCREEN option
the permit option for the particular SCREEN option
the SCREEN option, because it does not drop traffic by default
the alarm-without-drop option for the particular SCREEN option
第23题:
[edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }
第24题:
the user role
the ether0 IP address
the default route for this DX appliance
the address of a network TFTP server