题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-09-30 21:52:06

[单项选择]The SRX device receives a packet and determines that it does not match an existing session.After SCREEN options are evaluated, what is evaluated next?()
A. source NAT
B. destination NAT
C. route lookup
D. zone lookup

更多"The SRX device receives a packet an"的相关试题:

[单项选择]When an SRX series device receives an ESP packet, what happens?()
A. If the destination address of the outer IP header of the ESP packet matches the IP address of the ingress interface, it will
B. If the destination IP address in the outer IP header of ESP does not match the IP address of the ingress interface, it will
C. If the destination address of the outer IP header of the ESP packet matches the IP address of the ingress interface, based packet.
D. If the destination address of the outer IP header of the ESP packet matches the IP address of the ingress interface, based of inner header, it will decrypt the packet.
[单项选择] You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()
A. The intranet-auth authentication option
B. The redirect-portal application service
C. The uac-policy application service
D. The ipsec-vpn tunnel
[多项选择]Which three actions can a branch SRX Series device perform on a spam e-mail message?() (Choose three.)
A. It can drop the connection at the IP address level
B. It can block the e-mail based upon the sender ID
C. It can allow the e-mail and bypass all UTM inspection
D. It can allow the e-mail to be forwarded, but change the intended recipient to a new e-mail address
E. It can allow the e-mail to be forwarded to the destination, but tag it with a custom value in the subject line
[单项选择]In a chassis cluster with two SRX 5800 devices, the interface ge-13/0/0 belongs to which device?()
A. This interface is a system-created interface.
B. This interface belongs to node 0 of the cluster.
C. This interface belongs to node 1 of the cluster.
D. This interface will not exist because SRX 5800 devices have only 12 slots.
[单项选择]This device will help the detectives see things that may remain .
A. advanced; hidden
B. advancing; hiding
C. advanced; hiding
D. advancing; hidden
[单项选择]The packet of chocolate was ______ the reach of the child.
A. without
B. under
C. within
D. behind
[单项选择]Which antivirus solution integrated on branch SRX Series devices do you use to ensure maximum virus coverage for network traffic?()
A. express AV
B. full AV
C. desktop AV
D. ICAP
[多项选择] You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
A. The endpoints can use agentless access.
B. Encrypted traffic flows between the endpoint and the enforcer.
C. Encrypted traffic flows between the endpoint and the protected resource
D. The endpoints can use the Odyssey Access Client.
[单项选择]You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()
A. When you want all unauthenticated traffic to be redirected
B. When you want all clear text traffic to be redirected.
C. When you want all authenticated traffic to be redirected.
D. When you want all encrypted traffic to be redirected.
[单项选择]You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN.On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each participating interface, what provides this functionality?()
A. guest-vlan
B. auth-fail-vlan
C. server-reject-vlan
D. server-fail-vlan
[多项选择]You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
A. access profile
B. IKE parameters
C. tunneled interface
D. redirect policy
[单项选择]When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()
A. The cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.
B. The cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.
C. The cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.
D. The cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.
[多项选择]Which three features are part of the branch SRX series UTM suite?() (Choose three.)
A. antispam
B. antivirus
C. IPS
D. application firewalling
E. Web filtering
[多项选择]An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)
A. Only main mode can be used for IKE negotiation
B. A local-identity must be defined
C. It must be the initiator for IKE
D. A remote-identity must be defined
[多项选择]You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
A. Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
B. Configure a security policy that references the unified-access-control captive-portal service.
C. Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
D. Configure a security policy that references the unified-access-control intranet-controller service.
[多项选择]Which three packet interception methods are configurable in WX devices?() (Choose three.)
A. OSPF
B. WCCP
C. policy based routing
D. route injection using RIPv1
E. route injection using RIPv2
[单项选择]The fastest transatlantic voyage by a packet mentioned by the author was from ______.
A. Liverpool to New York
B. New York to Liverpool
C. Liverpool to Baltimore
D. Baltimore to Liverpool
[单项选择]The typical firewall consists of two packet filters and a (an)
A. router
B. bridge
C. application
D. server

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

截图扫码使用小程序[完全免费查看答案]
请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码