单选题 Which command do you use to manually remove antivirus patterns?()
request security utm anti-virus juniper-express-engine pattern-delete
request security utm anti-virus juniper-express-engine pattern-reload
request security utm anti-virus juniper-express-engine pattern-remove
delete security utm anti-virus juniper-express-engine antivirus-pattern
多选题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
单选题 Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?()
policy-rematch
policy-evaluate
rematch-policy
evaluate-policy
单选题 What is the proper sequence of evaluation for the SurfControl integrated Web filter solution?()
whitelists, blacklists, SurfControl categories
blacklists, whitelists, SurfControl categories
SurfControl categories, whitelists, blacklists
SurfControl categories, blacklists, whitelists
单选题 Which security or functional zone name has special significance to the Junos OS?()
self
trust
untrust
junos-global
单选题 What is the purpose of a chassis cluster?()
Chassis clusters are used to aggregate routes.
Chassis clusters are used to create aggregate interfaces.
Chassis clusters are used to group two chassis into one logical chassis.
Chassis clusters are used to group all interfaces into one cluster interface.
多选题 Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)
protocol list
MIME
block list
extension
单选题 Which statement describes a security zone?()
A security zone can contain one or more interfaces.
A security zone can contain interfaces in multiple routing instances.
A security zone must contain two or more interfaces.
A security zone must contain bridge groups.
单选题 Regarding fast path processing, when does the system perform the policy check?()
The policy is determined after the SCREEN options check.
The policy is determined only during the first packet path, not during fast path.
The policy is determined after the zone check.
The policy is determined after the SYN TCP flag.
多选题 Which two statements are true with regard to policy ordering? ()(Choose two.)
The last policy is the default policy, which allows all traffic.
The order of policies is not important.
New policies are placed at the end of the policy list.
The insert command can be used to change the order.