移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 Which command do you use to manually remove antivirus patterns?()

A

request security utm anti-virus juniper-express-engine pattern-delete

B

request security utm anti-virus juniper-express-engine pattern-reload

C

request security utm anti-virus juniper-express-engine pattern-remove

D

delete security utm anti-virus juniper-express-engine antivirus-pattern

多选题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)

A

data integrity

B

data confidentiality

C

data authentication

D

outer IP header confidentiality

E

outer IP header authentication

单选题 Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?()

A

policy-rematch

B

policy-evaluate

C

rematch-policy

D

evaluate-policy

单选题 What is the proper sequence of evaluation for the SurfControl integrated Web filter solution?()

A

whitelists, blacklists, SurfControl categories

B

blacklists, whitelists, SurfControl categories

C

SurfControl categories, whitelists, blacklists

D

SurfControl categories, blacklists, whitelists

单选题 Which security or functional zone name has special significance to the Junos OS?()

A

self

B

trust

C

untrust

D

junos-global

单选题 What is the purpose of a chassis cluster?()

A

Chassis clusters are used to aggregate routes.

B

Chassis clusters are used to create aggregate interfaces.

C

Chassis clusters are used to group two chassis into one logical chassis.

D

Chassis clusters are used to group all interfaces into one cluster interface.

单选题 Which statement describes a security zone?()

A

A security zone can contain one or more interfaces.

B

A security zone can contain interfaces in multiple routing instances.

C

A security zone must contain two or more interfaces.

D

A security zone must contain bridge groups.

单选题 A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()

A

from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

B

from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

C

from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }

D

from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

多选题 Which two statements are true with regard to policy ordering? ()(Choose two.)

A

The last policy is the default policy, which allows all traffic.

B

The order of policies is not important.

C

New policies are placed at the end of the policy list.

D

The insert command can be used to change the order.

首页 上一页 1 2 3 4 5 尾页 /

到第