当前分类: JN0-332
问题:单选题What is the correct syntax for applying node-specific parameters to each node in a chassis cluster?()A set apply-groups node$B set apply-groups (node)C set apply-groups $(node)D set apply-groups (node)all...
查看答案
问题:多选题Which three components can be leveraged when defining a local whitelist or blacklist for antispam on a branch SRX Series device? (Choose three.)()Aspam assassin filtering scoreBsender countryCsender IP addressDsender domainEsender e-mail address...
问题:单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system th...
问题:单选题Which zone is system-defined?()A securityB functionalC junos-globalD management...
问题:单选题How do you apply UTM enforcement to security policies on the branch SRX series?()A UTM profiles are applied on a security policy by policy basis.B UTM profiles are applied at the global policy level.C Individual UTM features like anti-spam or anti-viru...
问题:单选题Which command do you use to manually remove antivirus patterns?()A request security utm anti-virus juniper-express-engine pattern-deleteB request security utm anti-virus juniper-express-engine pattern-reloadC request security utm anti-virus juniper-exp...
问题:单选题Which zone type can be specified in a policy?()A securityB functionalC userD system...
问题:多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security ...
问题:单选题Under which Junos hierarchy level are security policies configured?()A [edit security]B [edit protocols]C [edit firewall]D [edit policy-options]...
问题:单选题For which network anomaly does Junos provide a SCREEN?()A a telnet to port 80B a TCP packet with the SYN and ACK flags setC an SNMP getnext requestD an ICMP packet larger than 1024 bytes...
问题:多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication...
问题:单选题The Junos OS blocks an HTTP request due to the category of the URL.Which form of Web filtering is being used?()A redirect Web filteringB integrated Web filteringC categorized Web filteringD local Web filtering...
问题:多选题Which three statements are true when working with high-availability clusters? (Choose three.)()AThe valid cluster-id range is between 0 and 255.BJunos OS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the ...
问题:多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be u...
问题:单选题Which statement contains the correct parameters for a route-based IPsec VPN?()A [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }po...
问题:单选题You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A [edit security...