移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()

A

The host needs to open the telnet port.

B

The host needs a route for the translated address.

C

The administrator must use a proxy-arp policy for the translated address.

D

The administrator must use a security policy, which will allow communication between the zones.

单选题 When using UTM features in an HA cluster, which statement is true for installing the licenses on the cluster members?()

A

One UTM cluster license will activate UTM features on both members.

B

Each device will need a UTM license generated for its serial number.

C

Each device will need a UTM license generated for the cluster, but licenses can be applied to either member.

D

HA clustering automatically comes with UTM licensing, no additional actions are needed.

单选题 Which Web-filtering technology can be used at the same time as integrated Web filtering on a single branch SRX Series device?()

A

Websense redirect Web filtering

B

local Web filtering (blacklist or whitelist)

C

firewall user authentication

D

ICAP

单选题 Which statement is true regarding the Junos OS for security platforms?()

A

SRX Series devices can store sessions in a session table.

B

SRX Series devices accept all traffic by default.

C

SRX Series devices must operate only in packet-based mode.

D

SRX Series devices must operate only in flow-based mode.

单选题 Which statement contains the correct parameters for a route-based IPsec VPN?()

A

[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

B

[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

C

[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

D

[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

单选题 The Junos OS blocks an HTTP request due to the category of the URL.Which form of Web filtering is being used?()

A

redirect Web filtering

B

integrated Web filtering

C

categorized Web filtering

D

local Web filtering

单选题 For which network anomaly does Junos provide a SCREEN?()

A

a telnet to port 80

B

a TCP packet with the SYN and ACK flags set

C

an SNMP getnext request

D

an ICMP packet larger than 1024 bytes

单选题 How do you apply UTM enforcement to security policies on the branch SRX series?()

A

UTM profiles are applied on a security policy by policy basis.

B

UTM profiles are applied at the global policy level.

C

Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.

D

Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.

单选题 What is the correct syntax for applying node-specific parameters to each node in a chassis cluster?()

A

set apply-groups node$

B

set apply-groups (node)

C

set apply-groups $(node)

D

set apply-groups (node)all

首页 上一页 1 2 3 4 5 下一页 尾页 /

到第