移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

多选题 Which two statements describe the purpose of a security policy?()

A

It enables traffic counting and logging.

B

It enforces a set of rules for transit traffic.

C

It controls host inbound services on a zone.

D

It controls administrator rights to access the device.

单选题 You want to allow your device to establish OSPF adjacencies with a neighboring device connected tointerface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()

A

[edit security policies from-zone HR to-zone HR]

B

[edit security zones functional-zone management protocols]

C

[edit security zones protocol-zone HR host-inbound-traffic]

D

[edit security zones security-zone HR host-inbound-traffic protocols]

单选题 What is a redundancy group in JUNOS Software?()

A

a set of chassis clusters that fail over as a group

B

a set of devices that participate in a chassis cluster

C

a set of VRRP neighbors that fail over as a group

D

a set of chassis cluster objects that fail over as a group

多选题 Which two statements are true about pool-based destination NAT?()

A

It also supports PAT.

B

PAT is not supported.

C

It allows the use of an address pool.

D

It requires you to configure an address in the junos-global zone.

单选题 Which attribute is required for all IKE phase 2 negotiations?()

A

proxy-ID

B

preshared key

C

Diffie-Hellman group key

D

main or aggressive mode

多选题 Which two statements are true regarding firewall user authentication?()

A

When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

B

When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

C

If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.

D

If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

单选题 When applying the configuration in the exhibit and initializing a chassis cluster, which statement is correct?() [edit chassis] user@host# show cluster { reth-count 3; redundancy-group 1 { node 0 priority 1; node 1 priority 100; } }

A

Three physical interfaces are redundant.

B

You must define an additional redundancy group.

C

node 0 will immediately become primary for redundancy group 1.

D

You must issue an operational command and reboot the system for the above configuration to take effect.

单选题 Using a policy with the policy-rematch flag enabled, what happens to the existing and newsessions when you change the policy action from permit to deny?()

A

The new sessions matching the policy are denied. The existing sessions are dropped.

B

The new sessions matching the policy are denied. The existing sessions, not being allowed to carry any traffic, simply timeout.

C

The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.

D

The new sessions matching the policy are denied. The existing sessions continue until they are completed or their timeout is reached.

首页 上一页 1 2 3 4 5 下一页 尾页 /

到第