It enables traffic counting and logging.
It enforces a set of rules for transit traffic.
It controls host inbound services on a zone.
It controls administrator rights to access the device.
第1题:
Which two statements regarding JUNOS architecture are correct?()
第2题:
You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
第3题:
Which two statements describe the purpose of a security policy?()
第4题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
第5题:
Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)
第6题:
Addresses used for NAT pools should never overlap.
If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.
If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.
Dynamic source NAT rules take precedence over static source NAT rules.
第7题:
It controls inter-zone traffic.
It controls intra-zone traffic.
It is named with a system-defined name.
It controls traffic destined to the device's ingress interface.
第8题:
[edit security idp]
[edit security zones security-zone trust interfaces ge-0/0/0.0]
[edit security zones security-zone trust]
[edit security screen]
第9题:
It enables traffic counting and logging.
It enforces a set of rules for transit traffic.
It controls host inbound services on a zone.
It controls administrator rights to access the device.
第10题:
The Routing Engine handles all exception traffic.
The Routing Engine synchronizes the route table with the PFE
The Routing Engine is hot-pluggable.
The Routing Engine controls the PFE
第11题:
extends networkQoS throughout the network
simplifies management of central or remotely locates access points
ensures implementation of the most recent security protocols
streamlines wireless LAN management
extends features for optical traffic network services
第12题:
Traffic is permitted from the trust zone to the untrust zone.
Intrazone traffic in the trust zone is permitted.
All traffic through the device is denied.
The policy is matched only when no other matching policies are found.
第13题:
Which two configuration options must be present for IPv4 transit traffic to pass between the ge-0/0/0.0 andge-0/0/2.0 interfaces?()
第14题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第15题:
Which two statements are true for a security policy? ()(Choose two.)
第16题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第17题:
Which two configuration elements are required for a route-based VPN?()
第18题:
DNS traffic is denied.
HTTP traffic is denied.
FTP traffic is permitted.
SMTP traffic is permitted.
第19题:
IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
IDP inspects traffic up to the Presentation layer.
IDP inspects traffic up to the Application layer.
第20题:
The endpoints can use agentless access.
Encrypted traffic flows between the endpoint and the enforcer.
Encrypted traffic flows between the endpoint and the protected resource
The endpoints can use the Odyssey Access Client.
第21题:
family inet
a security zone
a routing instance
host-inbound-traffic
第22题:
extends networkQoS throughout the network
simplifies management of central or remotely located access points
ensures implementation of the most recent security protocols
streamlines wireless LAN management
extends features for optical traffic network services
第23题:
secure tunnel interface
security policy to permit the IKE traffic
a route for the tunneled transit traffic
tunnel policy for transit traffic referencing the IPsec VPN
第24题:
DNS traffic is denied.
HTTP traffic is denied.
FTP traffic is permitted.
SMTP traffic is permitted.