当前分类: JN0-332
问题:单选题Which statement contains the correct parameters for a route-based IPsec VPN?()A [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }po...
查看答案
问题:多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security ...
问题:单选题You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A [edit security...
问题:单选题Which zone is system-defined?()A securityB functionalC junos-globalD management...
问题:单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to in...
问题:单选题What is the correct syntax for applying node-specific parameters to each node in a chassis cluster?()A set apply-groups node$B set apply-groups (node)C set apply-groups $(node)D set apply-groups (node)all...
问题:单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system th...
问题:单选题A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()A The host needs ...
问题:单选题When using UTM features in an HA cluster, which statement is true for installing the licenses on the cluster members?()A One UTM cluster license will activate UTM features on both members.B Each device will need a UTM license generated for its serial n...
问题:单选题How do you apply UTM enforcement to security policies on the branch SRX series?()A UTM profiles are applied on a security policy by policy basis.B UTM profiles are applied at the global policy level.C Individual UTM features like anti-spam or anti-viru...
问题:多选题An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)AOnly main mode can be used for IKE negotiationBA local-identity must be definedCIt must be t...
问题:单选题The Junos OS blocks an HTTP request due to the category of the URL.Which form of Web filtering is being used?()A redirect Web filteringB integrated Web filteringC categorized Web filteringD local Web filtering...
问题:多选题Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)Aprotocol listBMIMECblock listDextension...
问题:多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be u...
问题:多选题Which three statements are true when working with high-availability clusters? (Choose three.)()AThe valid cluster-id range is between 0 and 255.BJunos OS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the ...