当前分类: JN0-332
问题:单选题Which statement is true regarding NAT?()A NAT is not supported on SRX Series devices.B NAT requires special hardware on SRX Series devices.C NAT is processed in the control plane.D NAT is processed in the data plane....
查看答案
问题:多选题Which three methods of source NAT does the Junos OS support?() (Choose three.)Ainterface-based source NATBsource NAT with address shiftingCsource NAT using static source poolDinterface-based source NAT without PATEsource NAT with address shifting and P...
问题:多选题Which two parameters are configured in IPsec policy? ()(Choose two.)AmodeBIKE gatewayCsecurity proposalDPerfect Forward Secrecy...
问题:单选题Regarding fast path processing, when does the system perform the policy check?()A The policy is determined after the SCREEN options check.B The policy is determined only during the first packet path, not during fast path.C The policy is determined afte...
问题:多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be u...
问题:多选题An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)AOnly main mode can be used for IKE negotiationBA local-identity must be definedCIt must be t...
问题:单选题What is the default session timeout for TCP sessions?()A 1 minuteB 15 minutesC 30 minutesD 90 minutes...
问题:多选题Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)Aprotocol listBMIMECblock listDextension...
问题:单选题Which statement is correct about HTTP trickling?()A It prevents the HTTP client or server from timing-out during an antivirus updateB It prevents the HTTP client or server from timing-out during antivirus scanning.C It is an attack.D It is used to bypa...
问题:单选题Which zone type can be specified in a policy?()A securityB functionalC userD system...
问题:多选题Which two statements are true about hierarchical architecture? ()(Choose two.)AYou can assign a logical interface to multiple zones.BYou cannot assign a logical interface to multiple zones.CYou can assign a logical interface to multiple routing instanc...
问题:多选题Which three parameters are configured in the IKE policy? ()(Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings...
问题:多选题Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)AIt is necessary to forward ARP requests to remote hosts.BIt is necessary when translated traffic belongs to the same subnet as the ingress interface....
问题:多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication...
问题:多选题Which two UTM features require a license to be activated? ()(Choose two.)AantispamBantivirus (full AV)Ccontent filteringDWeb-filtering redirect...
问题:单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to in...
问题:多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key...