移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 [edit groups] user@host# show node0 { system { host-name NODE0; } interfaces { fxp0 { unit 0 { family inet { address 1.1.1.1/24; } } } } } node1 { system { host-name NODE1; } interfaces { fxp0 { unit 0 { family inet { address 1.1.1.2/24; } } } } } In the exhibit, what is the function of the configuration statements?()

A

This section is where you define all chassis clustering configuration.

B

This configuration is required for members of a chassis cluster to talk to each other.

C

You can apply this configuration in the chassis cluster to make configuration easier.

D

This section is where unique node configuration is applied.

单选题 A policy-based IPsec VPN is ideal for which scenario?()

A

when you want to conserve tunnel resources

B

when the remote peer is a dialup or remote access client

C

when you want to configure a tunnel policy with an action of deny

D

when a dynamic routing protocol such as OSPF must be sent across the VPN

多选题 Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()

A

JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.

B

JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.

C

JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.

D

JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

多选题 Which two statements are true regarding high-availability chassis clustering?()

A

A chassis cluster consists of two devices.

B

A chassis cluster consists of two or more devices.

C

Devices participating in a chassis cluster can be different models.

D

Devices participating in a chassis cluster must be the same models

单选题 Regarding secure tunnel (st) interfaces, which statement is true?()

A

You cannot assign st interfaces to a security zone.

B

You cannot apply static NAT on an st interface logical unit.

C

st interfaces are optional when configuring a route-based VPN

D

A static route can reference the st interface logical unit as the next-hop

多选题 Which three statements are true regarding IDP?()

A

IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

B

IDP inspects traffic up to the Application layer.

C

IDP searches the data stream for specific attack patterns.

D

IDP inspects traffic up to the Presentation layer.

E

IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

多选题 Which two security policy actions are valid?()

A

deny

B

discard

C

reject

D

close

多选题 Users can define policy to control traffic flow between which two components?()

A

from a zone to the device itself

B

from a zone to the same zone

C

from a zone to a different zone

D

from one interface to another interface

单选题 What is the purpose of a zone in JUNOS Software?()

A

A zone defines a group of security devices with a common management.

B

A zone defines the geographic region in which the security device is deployed.

C

A zone defines a group of network segments with similar security requirements.

D

A zone defines a group of network segments with similar class-of-service requirements.

单选题 Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()

A

close-connection

B

terminate-connection

C

close-client-and-server

D

terminate-session

首页 上一页 1 2 3 4 5 下一页 尾页 /

到第