when you want to conserve tunnel resources
when the remote peer is a dialup or remote access client
when you want to configure a tunnel policy with an action of deny
when a dynamic routing protocol such as OSPF must be sent across the VPN
第1题:
A route-based VPN is required for which scenario? ()
第2题:
Which command is needed to change this policy to a tunnel policy for a policy-based VPN?() [edit security policies from-zone trust to-zone untrust] user@host# show policy tunnel-traffic { match { source-address local-net; destination-address remote-net; application any; then { permit; } }
第3题:
A route-based VPN is required for which scenario?()
第4题:
In which scenario will you use the Flashback Transaction Query feature?()
第5题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()
第6题:
You want to configure your Windows 2000 Professional computer to remotely access your company's Windows 2000 Routing and Remote Access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to Secure Server. When you try to connect, you receive the following error message, "The encryption attempt failed because no valid certificate was found." What should you do to connect to the server? ()
第7题:
when you want to restore an important table that is dropped from the Recycle Bin
when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction
when you want to restore a dropped user’s schema
when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period
第8题:
when you want to conserve tunnel resources
when the remote peer is a dialup or remote access client
when you want to configure a tunnel policy with an action of deny
when a dynamic routing protocol such as OSPF must be sent across the VPN
第9题:
set policy tunnel-traffic then tunnel remote-vpn
set policy tunnel-traffic then permit tunnel remote-vpn
set policy tunnel-traffic then tunnel ipsec-vpn remote-vpn permit
set policy tunnel-traffic then permit tunnel ipsec-vpn remote-vpn
第10题:
The crypto ACL number
The IPSEC mode (tunnel or transport)
The GRE tunnel interface IP address
The GRE tunnel source interface or IP address, and tunnel destination IP address
The MTU size of the GRE tunnel interface
第11题:
A route-based VPN generally uses less resources than a policy-based VPN.
A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.
A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.
A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
第12题:
when the remote VPN peer is behind a NAT device
when multiple networks need to be reached across the tunnel and GRE cannot be used
when the remote VPN peer is a dialup or remote access client
when a dynamic routing protocol is required across the VPN and GRE cannot be used
第13题:
A policy-based IPsec VPN is ideal for which scenario?()
第14题:
Regarding a route-based versus policy-based IPsec VPN, which statement is true?()
第15题:
You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()
第16题:
In which scenario will you use the Flashback Version Query feature?()
第17题:
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()
第18题:
Enable the VPN connection to use MS-CHAP.
Change the data encryption setting to Optional Encryption.
Specify a TCP/IP address in the network properties.
Change the IPSec policy setting to Client.
第19题:
Configure each server running Routing and Remote Access as a RADIUS Client.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
第20题:
when the remote VPN peer is behind a NAT device
when multiple networks need to be reached across the tunnel
when the remote VPN peer is a dialup or remote access client
when a dynamic routing protocol such as OSPF is required across the VPN
第21题:
set policy tunnel-traffic then tunnel remote-vpn
set policy tunnel-traffic then permit tunnel remote-vpn
set policy tunnel-traffic then tunnel ipsec-vpn remote-vpn permit
set policy tunnel-traffic then permit tunnel ipsec-vpn remote-vpn
第22题:
Configure the system event log to Do not overwrite.
In IAS, in Remote Access Logging, enable the Authentication requests setting.
Configure the Remote Access server to Log all events.
Create a custom remote access policy and configure it for Authentication-Type.
第23题:
when you want to restore a table that has been dropped from the Recycle Bin
when you want to identify the transaction ID of the transaction that deleted some important records from a table
when you want to recover the schema of a dropped user
when you want to restore a dropped tablespace
第24题:
Configure each server running Routing and Remote Access as a RADIUS Client.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.