移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 You are not able to telnet to the interface IP address of your device from a PC on the same subnet. What iscausing the problem?()

A

Telnet is not being permitted by self policy.

B

Telnet is not being permitted by security policy.

C

Telnet is not allowed because it is not considered secure.

D

Telnet is not enabled as a host-inbound service on the zone

单选题 Which parameters are valid SCREEN options for combating operating system probes?()

A

syn-fin, syn-flood, and tcp-no-frag

B

syn-fin, port-scan, and tcp-no-flag

C

syn-fin, fin-no-ack, and tcp-no-frag

D

syn-fin, syn-ack-ack-proxy, and tcp-no-frag

单选题 Regarding zone types, which statement is true?()

A

You cannot assign an interface to a functional zone.

B

You can specifiy a functional zone in a security policy.

C

Security zones must have a scheduler applied.

D

You can use a security zone for traffic destined for the device itself.

单选题 For IKE phase 1 negotiations, when is aggressive mode typically used?()

A

when one of the tunnel peers has a dynamic IP address

B

when one of the tunnel peers wants to force main mode to be used

C

when fragmentation of the IKE packet is required between the two peers

D

when one of the tunnel peers wants to specify a different phase 1 proposal

单选题 A route-based VPN is required for which scenario?()

A

when the remote VPN peer is behind a NAT device

B

when multiple networks need to be reached across the tunnel and GRE cannot be used

C

when the remote VPN peer is a dialup or remote access client

D

when a dynamic routing protocol is required across the VPN and GRE cannot be used

单选题 Which statement is true about source NAT?()

A

Source NAT works only with source pools.

B

Destination NAT is required to translate the reply traffic.

C

Source NAT does not require a security policy to function.

D

The egress interface IP address can be used for source NAT

多选题 Which two statements regarding asymmetric key encryption are true?()

A

The same key is used for encryption and decryption.

B

It is commonly used to create digital certificate signatures.

C

It uses two keys: one for encryption and a different key for decryption.

D

An attacker can decrypt data if the attacker captures the key used for encryption

多选题 What are two components of the JUNOS Software architecture?()

A

Linux kernel

B

routing protocol daemon

C

session-based forwarding module

D

separate routing and security planes

1 2 3 4 5 下一页 尾页 /

到第