access profile
client group
client
default profile
external
第1题:
A. access profile
B. client group
C. client
D. default profile
E. external
第2题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第3题:
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
第4题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第5题:
What are three different integrated UTM components available on the branch SRX Series devices?() (Choose three.)
第6题:
Which three advanced permit actions within security policies are valid?() (Choose three.)
第7题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第8题:
ping
FTP
Telnet
HTTP
HTTPS
第9题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第10题:
onboard VPN accelerator
events correlation and proactive response
high-performance AIM VPN modules
virtual firewall
Cisco lOS Firewall and lOS IPS
transparent firewall
第11题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第12题:
show access firewall-authentication
show security firewall-authentication users
show security audit log
show security firewall-authentication history
第13题:
A. ping
B. FTP
C. Telnet
D. HTTP
E. HTTPS
第14题:
Which two firewall user authentication objects can be referenced in a security policy?()
第15题:
Which two commands can be used to monitor firewall user authentication?()
第16题:
Which two statements regarding firewall user authentication client groups are true?()
第17题:
Which three parameters are configured in the IKE policy? ()(Choose three.)
第18题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)
第19题:
Which statement accurately describes firewall user authentication?()
第20题:
access profile
client group
client
default profile
external
第21题:
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
第22题:
When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第23题:
access profile
client group
client
default profile
第24题:
Mark permitted traffic for firewall user authentication.
Mark permitted traffic for SCREEN options.
Associate permitted traffic with an IPsec tunnel.
Associate permitted traffic with a NAT rule.
Mark permitted traffic for IDP processing.