secure tunnel interface
security policy to permit the IKE traffic
a route for the tunneled transit traffic
tunnel policy for transit traffic referencing the IPsec VPN
第1题:
A. when the remote VPN peer is behind a NAT device
B. when multiple networks need to be reached across the tunnel
C. when the remote VPN peer is a dialup or remote access client
D. when a dynamic routing protocol such as OSPF is required across the VPN
第2题:
What is not a difference between VPN tunnel authentication and per-user authentication?()
第3题:
A route-based VPN is required for which scenario? ()
第4题:
A policy-based IPsec VPN is ideal for which scenario?()
第5题:
You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()
第6题:
Which configuration shows the correct application of a security policy scheduler?()
第7题:
Regarding a route-based versus policy-based IPsec VPN, which statement is true?()
第8题:
Which statement is true regarding IPsec VPNs?()
第9题:
A route-based VPN is required for which scenario?()
第10题:
set policy tunnel-traffic then tunnel remote-vpn
set policy tunnel-traffic then permit tunnel remote-vpn
set policy tunnel-traffic then tunnel ipsec-vpn remote-vpn permit
set policy tunnel-traffic then permit tunnel ipsec-vpn remote-vpn
第11题:
It enables traffic counting and logging.
It enforces a set of rules for transit traffic.
It controls host inbound services on a zone.
It controls administrator rights to access the device.
第12题:
A route-based VPN generally uses less resources than a policy-based VPN.
A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.
A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.
A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
第13题:
A.access - list 1 permit 172.16.10.0 0.0.0.255 ! interface e0 ip policy route - map policy ! route - map policy permit 10 match ip address 1 set ip next - hop 1 72.16.14.4
B.access - list 1 permit 172.16.10.0 0.0.0.255 ! interface s0 ip policy route - map policy ! route - map policy permit 10 match ip address 1 set ip next - hop 172.16.12.3
C.access - list 1 permit 172.16.10.0 0.0.0.255 ! interface e0 ip polic y route - map policy ! route - map policy permit 10 match ip address 1 set ip next - hop 172.16.12.2
D.access -list 1 deny 172.16.10.0 0.0.0.255 ! interface s0 ip policy route - map policy ! route - map policy permit 10 match ip address 1 set ip next - hop 172.16.12.2
第14题:
Which statement is true about the SDM QoS wizard and its ability to enable a QoS policy on router interfaces?()
第15题:
Which two configuration elements are required for a policy-based VPN?()
第16题:
Which command is needed to change this policy to a tunnel policy for a policy-based VPN?() [edit security policies from-zone trust to-zone untrust] user@host# show policy tunnel-traffic { match { source-address local-net; destination-address remote-net; application any; then { permit; } }
第17题:
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
第18题:
Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()
第19题:
Which two statements describe the purpose of a security policy?()
第20题:
Based on the configuration shown in the exhibit, what are the actions of the security policy?() [edit schedulers] user@host# show scheduler now { monday all-day; tuesday exclude; wednesday { start-time 07:00:00 stop-time 18:00:00; } thursday { start-time 07:00:00 stop-time 18:00:00; } } [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps;} then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now;
第21题:
Which two configuration elements are required for a route-based VPN?()
第22题:
A
B
C
D
第23题:
IKE gateway
secure tunnel interface
security policy to permit the IKE traffic
security policy referencing the IPsec VPN tunnel