网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
Which two Junos platforms provide stateful firewall functionality?()
A
MX Series
B
EX Series
C
SRX Series
D
QFX Series
参考答案
参考解析
解析:
暂无解析
更多 “多选题Which two Junos platforms provide stateful firewall functionality?()AMX SeriesBEX SeriesCSRX SeriesDQFX Series” 相关考题
考题
Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
A. VPN establishmentB. stateful ARP lookupsC. Dynamic ARP inspectionD. Network Address TranslationE. inspection of packets at higher levels (Layer 4 and above)
考题
You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()A. CLIB. WebUIC. NSMD. Junos Pulse Access Control Service
考题
A traditional router is better suited than a firewall device for which function? ()
A. VPN establishmentB. packet-based forwardingC. stateful packet processingD. network address translation
考题
Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)
A. rate limiting of ICMPB. RADIUS authorizationsC. source address validationD. stateful firewall on the router
考题
Which two Junos platforms provide stateful firewall functionality?()
A. MX SeriesB. EX SeriesC. SRX SeriesD. QFX Series
考题
A Stateful firewall is MOST useful in protecting against which of the following network scans?()
A.PINGB.UDPC.XmasD.ACK
考题
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
A. fewer devices to manageB. moderate-to-high scalabilityC. stateful inspection of decrypted VPN trafficD. increased bandwidth with additional interfacesE. decreased complexity as traffic is filtered from the firewall
考题
Which three functions are provided by JUNOS Software for security platforms?()A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)
考题
Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()A、Stateful firewallB、Proxy firewallC、Packet filtering firewallD、Stateless firewall
考题
Which two statements are correct about firewall filters in the Junos OS?()A、Firewall filters are stateless.B、Firewall filters are used to control routing information that is exchanged between devices.C、Firewall filters are used to control traffic passing through the device.D、Firewall filters can only be applied to traffic entering the device.
考题
A traditional router is better suited than a firewall device for which function?()A、VPN establishmentB、packet-based forwardingC、stateful packet processingD、Network Address Translation
考题
Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()A、JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.B、JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.C、JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.D、JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.
考题
Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
考题
Which statement is true regarding the Junos OS?()A、All platforms running the Junos OS use the same source code baseB、All platforms running the Junos OS use the same PFEC、All platforms running the Junos OS use a hard drive to optimize syslog data storageD、All platforms running the Junos OS use a separate process with protected memory space for each routing protocol
考题
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()A、fewer devices to manageB、moderate-to-high scalabilityC、stateful inspection of decrypted VPN trafficD、increased bandwidth with additional interfacesE、decreased complexity as traffic is filtered from the firewall
考题
A Stateful firewall is MOST useful in protecting against which of the following network scans?()A、PINGB、UDPC、XmasD、ACK
考题
Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
考题
Which three functions are provided by the Junos OS for security platforms?()(Choose three.)A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)
考题
You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()A、CLIB、WebUIC、NSMD、Junos Pulse Access Control Service
考题
Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)A、rate limiting of ICMPB、RADIUS authorizationsC、source address validationD、stateful firewall on the router
考题
单选题Which statement is true regarding the Junos OS?()A
All platforms running the Junos OS have identical factory-default configurationsB
All platforms running the Junos OS use the IP2 processor for longest-match lookupC
All platforms running the Junos OS use the same source code baseD
All platforms running the Junos OS use FXP1 for communication between control and forwarding planes
考题
单选题Which statement is true regarding the Junos OS?()A
All platforms running the Junos OS separate the functions of learning and flooding.B
All platforms running the Junos OS separate the functions of control and forwarding.C
All platforms running the Junos OS separate the functions of routing and bridging.D
All platforms running the Junos OS separate the functions of management and routing.
考题
多选题Which two Junos platforms provide stateful firewall functionality?()AMX SeriesBEX SeriesCSRX SeriesDQFX Series
考题
多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
考题
多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
考题
单选题Which statement is true regarding the Junos OS?()A
All platforms running the Junos OS have identical factory-default configurations.B
All platforms running the Junos OS use the IP2 processor for longest-match lookup.C
All platforms running the Junos OS use the same source code base.D
All platforms running the Junos OS use FXP1 for communication between control and forwarding planes.
考题
多选题Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()ARADIUSBTACACS+CLDAPDIIS
考题
单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()A
VIP is not required when using only agentless access for all endpoint platforms.B
VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.C
VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.D
VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.
热门标签
最新试卷