当前分类: JN0-332
问题:单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system th...
查看答案
问题:单选题When using UTM features in an HA cluster, which statement is true for installing the licenses on the cluster members?()A One UTM cluster license will activate UTM features on both members.B Each device will need a UTM license generated for its serial n...
问题:单选题Which zone type can be specified in a policy?()A securityB functionalC userD system...
问题:多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication...
问题:多选题Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)AIt is necessary to forward ARP requests to remote hosts.BIt is necessary when translated traffic belongs to the same subnet as the ingress interface....
问题:多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key...
问题:单选题Which statement is true regarding NAT?()A NAT is not supported on SRX Series devices.B NAT requires special hardware on SRX Series devices.C NAT is processed in the control plane.D NAT is processed in the data plane....
问题:单选题For which network anomaly does Junos provide a SCREEN?()A a telnet to port 80B a TCP packet with the SYN and ACK flags setC an SNMP getnext requestD an ICMP packet larger than 1024 bytes...
问题:多选题Which three parameters are configured in the IKE policy? ()(Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings...
问题:单选题Which UTM feature requires a license to function?()A integrated Web filteringB local Web filteringC redirect Web filteringD content filtering...
问题:多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be u...
问题:单选题Which statement describes a security zone?()A A security zone can contain one or more interfaces.B A security zone can contain interfaces in multiple routing instances.C A security zone must contain two or more interfaces.D A security zone must contain...
问题:单选题Which statement contains the correct parameters for a route-based IPsec VPN?()A [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }po...
问题:多选题Which three methods of source NAT does the Junos OS support?() (Choose three.)Ainterface-based source NATBsource NAT with address shiftingCsource NAT using static source poolDinterface-based source NAT without PATEsource NAT with address shifting and P...
问题:多选题Which two parameters are configured in IPsec policy? ()(Choose two.)AmodeBIKE gatewayCsecurity proposalDPerfect Forward Secrecy...
问题:多选题Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)Aprotocol listBMIMECblock listDextension...
问题:多选题Which three statements are true when working with high-availability clusters? (Choose three.)()AThe valid cluster-id range is between 0 and 255.BJunos OS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the ...
问题:单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to in...