当前分类: JN0-330
问题:单选题A route-based VPN is required for which scenario? ()A when the remote VPN peer is behind a NAT deviceB when multiple networks need to be reached across the tunnelC when the remote VPN peer is a dialup or remote access clientD when a dynamic routing pro...
查看答案
问题:单选题You are not able to telnet to the interface IP of your JUNOS software with enhanced services devicefrom a PC on the same subnet. What is causing the problem? ()A Telnet is not being permitted by self policy.B Telnet is not being permitted by security p...
问题:多选题In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)AIP protocolBIP time-to-liveCsource and destination IP addressDsource and destination MAC addressEsource and d...
问题:多选题Which three parameters are configured in the IKE policy?() (Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings...
问题:单选题Which statement is true about interface-based static NAT? ()A It also supports PAT.B It requires you to configure address entries in the junos-nat zone.C It requires you to configure address entries in the junos-global zone.D The IP addresses being tra...
问题:单选题Click the Exhibit button. In the exhibit, which statement is correct? ()A Three physical interfaces are redundant.B You must define an additional Redundancy Group.C node 0 will immediately become primary in the cluster.D You must issue an operation...
问题:单选题You want to create a policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in theUntrust zone. How do you do create this policy? ()A Specify the IP address (172.19.1.1/32) as the destination address in the policy.B Sp...
问题:单选题Click the Exhibit button. Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2. Which is a potential cause for this problem?()A The untrust zone does not have a management policy configured.B The trust zone does not have ping enabled as ...
问题:单选题Click the Exhibit button. Which type of source NAT is configured in the exhibit?()A static source poolB interface source poolC source pool with PATD souce pool without PAT...
问题:多选题Click the Exhibit button. host_a is in subnet_a and host_b is in subnet_b. Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?()ADNS traffic is denied.BTelnet traffic is denied.CSMTP traffic is den...
问题:单选题Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many flows exist ...
问题:单选题Click the Exhibit button. In the exhibit, what is the priority for Router B in VRRP group 100?()A 1B 100C 110D 255...
问题:多选题Which two are components of the enhanced services software architecture?() (Choose two.)ALinux kernelBrouting protocol daemonCsession-based forwarding moduleDseparate routing and security planes...
问题:多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS...
问题:多选题Which two statements regarding asymmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different ke...