多选题 What are two components of the JUNOS Software architecture?()
Linux kernel
routing protocol daemon
session-based forwarding module
separate routing and security planes
单选题 What is the purpose of an address book?()
It holds security policies for particular hosts.
It holds statistics about traffic to and from particular hosts.
It defines hosts in a zone so they can be referenced by policies.
It maps hostnames to IP addresses to serve as a backup to DNS resolution.
单选题 A traditional router is better suited than a firewall device for which function?()
VPN establishment
packet-based forwarding
stateful packet processing
Network Address Translation
多选题 Which three options represent IDP policy match conditions?()
protocol
source-address
port
application
attacks
单选题 Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.
DNS traffic is denied.
Telnet traffic is denied.
SMTP traffic is denied.
Ping traffic is permitted
多选题 Which two steps are performed when configuring a zone?()
Define a default policy for the zone.
Assign logical interfaces to the zone.
Assign physical interfaces to the zone.
Define the zone as a security or functional zone
单选题 What is the functionality of redundant interfaces (reth) in a chassis cluster?()
reth interfaces are used only for VRRP.
reth interfaces are the same as physical interfaces.
reth interfaces are pseudo-interfaces that are considered the parent interface for two physical interfaces.
Each cluster member has a reth interface that can be used to share session state information with the other cluster members.
单选题 Which statement accurately describes firewall user authentication?()
Firewall user authentication provides another layer of security in a network.
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
Firewall user authentication enables session-based forwarding.
Firewall user authentication is used as a last resort security method in a network.
公文的发文闭合程序?
初始评审的目的是为职业安全健康管理体系建立和实施提供基础,为职业安全健康管理体系的持续改进( )。
男性幼儿,4岁,发热、咳脓痰2周。体温波动于38~39℃。X线胸片示右肺下叶大片致密影,右胸膜腔积液。最常见的致病菌是()
对于PowerPoint2003中文本框内的文字,设置项目符号可以采用的是()。
牵引装置的分类,可分为()。
再生资源实行的先征后退工作中,纳税评估如果发现纳税人有异常情况应当及时通报初审的财政机关。
营改增改革试点后,应税服务的增值税优惠政策根据具体形式的不同主要包括哪些方式?
足月新生儿,出生体重2.3kg,羊膜早破,生后2天拒奶,呕吐,发绀,黄疸进行性加重。体检:体温不升,前囟平,颈软,全身黄染,心率150次/分,心音及心率正常,腹软,肝肋下3cm。化验:白细胞20×109/L,中性粒细胞占80%,胆红素308μmol/L,血型“O”,母亲血型为“A”,最大可能是()
引起肾盂肾炎最常见的致病菌是( )。
女性患者,54岁,劳动中突感头晕,随即左半身无力,右眼闭合不全,双眼向左侧凝视,10分钟后昏迷。高热、双瞳孔小、四肢软瘫,应考虑的诊断是()