It controls inter-zone traffic.
It controls intra-zone traffic.
It is named with a system-defined name.
It controls traffic destined to the device's ingress interface.
第1题:
A. 1 is the default precedence.
B. A lower number is preferred.
C. A higher number is preferred.
D. 100 is the default precedence.
第2题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第3题:
Which statement describes the behavior of a security policy?()
第4题:
Which two statements describe the purpose of a security policy?()
第5题:
Which two parameters are configured in IPsec policy? ()(Choose two.)
第6题:
Which two statements are true about precedence values in policy?() (Choose two.)
第7题:
Regarding zone types, which statement is true?()
第8题:
Add custom controls that emit XHTML to the Web Form.
Add custom controls that emit WML to the Web Form.
Add mobile controls to the Web Form.
Add Web server controls to the Web Form.
第9题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第10题:
It enables traffic counting and logging.
It enforces a set of rules for transit traffic.
It controls host inbound services on a zone.
It controls administrator rights to access the device.
第11题:
1 is the default precedence.
A lower number is preferred.
A higher number is preferred.
100 is the default precedence.
第12题:
Traffic is permitted from the trust zone to the untrust zone.
Intrazone traffic in the trust zone is permitted.
All traffic through the device is denied.
The policy is matched only when no other matching policies are found.
第13题:
A.The Routing Engine handles all exception traffic.
B.The Routing Engine synchronizes the route table with the PFE
C.The Routing Engine is hot-pluggable.
D.The Routing Engine controls the PFE
第14题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第15题:
Which two statements regarding JUNOS architecture are correct?()
第16题:
Which two statements are true for a security policy? ()(Choose two.)
第17题:
Which two statements are true with regard to policy ordering? ()(Choose two.)
第18题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第19题:
The last policy is the default policy, which allows all traffic.
The order of policies is not important.
New policies are placed at the end of the policy list.
The insert command can be used to change the order.
第20题:
The implicit default security policy permits all traffic.
Traffic destined to the device itself always requires a security policy.
Traffic destined to the device’s incoming interface does not require a security policy.
The factory-default configuration permits all traffic from all interfaces.
第21题:
It is necessary to forward ARP requests to remote hosts.
It is necessary when translated traffic belongs to the same subnet as the ingress interface.
It is not automatic and you must configure it.
It is enabled by default and you do not need to configure it.
第22题:
The Routing Engine handles all exception traffic.
The Routing Engine synchronizes the route table with the PFE
The Routing Engine is hot-pluggable.
The Routing Engine controls the PFE
第23题:
It's only supported for the backups performed on the tape
It is not supported for backup operations that produce image copies
Duplex backups need a parallelism for the device to be equal to number of copies
Duplex backups can be performed to either disk or tape, but cannot be performed on tape and disk simultaneously