当前分类: JN0-330
问题:单选题A traditional router is better suited than a firewall device for which function? ()A VPN establishmentB packet-based forwardingC stateful packet processingD network address translation...
查看答案
问题:多选题Which three parameters are configured in the IKE policy?() (Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings...
问题:多选题In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)AIP protocolBIP time-to-liveCsource and destination IP addressDsource and destination MAC addressEsource and d...
问题:单选题Which parameters must you select when configuring operating system probes SCREEN options?()A syn-fin, syn-flood, and tcp-no-fragB syn-fin, port-scan, and tcp-no-flagC syn-fin, fin-no-ack, and tcp-no-fragD syn-fin, syn-ack-ack-proxy, and tcp-no-frag...
问题:单选题You are not able to telnet to the interface IP of your JUNOS software with enhanced services devicefrom a PC on the same subnet. What is causing the problem? ()A Telnet is not being permitted by self policy.B Telnet is not being permitted by security p...
问题:单选题Which statement is true about interface-based static NAT? ()A It also supports PAT.B It requires you to configure address entries in the junos-nat zone.C It requires you to configure address entries in the junos-global zone.D The IP addresses being tra...
问题:单选题Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/...
问题:单选题A route-based VPN is required for which scenario? ()A when the remote VPN peer is behind a NAT deviceB when multiple networks need to be reached across the tunnelC when the remote VPN peer is a dialup or remote access clientD when a dynamic routing pro...
问题:多选题Click the Exhibit button. host_a is in subnet_a and host_b is in subnet_b. Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?()ADNS traffic is denied.BTelnet traffic is denied.CSMTP traffic is den...
问题:单选题Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many flows exist ...
问题:单选题Click the Exhibit button. Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2. Which is a potential cause for this problem?()A The untrust zone does not have a management policy configured.B The trust zone does not have ping enabled as ...
问题:多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS...
问题:多选题Which two statements regarding asymmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different ke...
问题:多选题Which two are components of the enhanced services software architecture?() (Choose two.)ALinux kernelBrouting protocol daemonCsession-based forwarding moduleDseparate routing and security planes...
问题:单选题Click the Exhibit button. In the exhibit, what is the priority for Router B in VRRP group 100?()A 1B 100C 110D 255...