移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

其他类 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 Click the Exhibit button. In the exhibit, which statement is correct? ()

A

Three physical interfaces are redundant.

B

You must define an additional Redundancy Group.

C

node 0 will immediately become primary in the cluster.

D

You must issue an operational command and reboot the system for the above configuration to take effect.

单选题 You want to create a policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in theUntrust zone. How do you do create this policy? ()

A

Specify the IP address (172.19.1.1/32) as the destination address in the policy.

B

Specify the DNS entry (hostb.example.com.) as the destination address in the policy.

C

Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.

D

Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.

多选题 Which two statements regarding asymmetric key encryption are true?() (Choose two.)

A

The same key is used for encryption and decryption.

B

It is commonly used to create digital certificate signatures.

C

It uses two keys: one for encryption and a different key for decryption.

D

An attacker can decrypt data if the attacker captures the key used for encryption.

单选题 A traditional router is better suited than a firewall device for which function? ()

A

VPN establishment

B

packet-based forwarding

C

stateful packet processing

D

network address translation

多选题 Which three parameters are configured in the IKE policy?() (Choose three.)

A

mode

B

preshared key

C

external interface

D

security proposals

E

dead peer detection settings

多选题 In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)

A

IP protocol

B

IP time-to-live

C

source and destination IP address

D

source and destination MAC address

E

source and destination TCP/UDP port

多选题 Users can define policy to control traffic flow between which two components? ()(Choose two.)

A

from a zone to the router itself

B

from a zone to the same zone

C

from a zone to a different zone

D

from one interface to another interface

单选题 Based on the configuration shown in the exhibit, what will happen to the traffic matching the security policy?()

A

The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.

B

The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.

C

The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.

D

The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.

推荐考题

最新资讯

1 2 3 下一页 尾页 /

到第