网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which three components can be leveraged when defining a local whitelist or blacklist for antispam on a branch SRX Series device? (Choose three.)()
A

spam assassin filtering score

B

sender country

C

sender IP address

D

sender domain

E

sender e-mail address


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which three components can be leveraged when defining a local whitelist or blacklist for antispam on a branch SRX Series device? (Choose three.)()Aspam assassin filtering scoreBsender countryCsender IP addressDsender domainEsender e-mail address” 相关考题
考题 多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication

考题 单选题Regarding fast path processing, when does the system perform the policy check?()A The policy is determined after the SCREEN options check.B The policy is determined only during the first packet path, not during fast path.C The policy is determined after the zone check.D The policy is determined after the SYN TCP flag.

考题 单选题A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()A The host needs to open the telnet port.B The host needs a route for the translated address.C The administrator must use a proxy-arp policy for the translated address.D The administrator must use a security policy, which will allow communication between the zones.

考题 多选题Which three statements are true when working with high-availability clusters? (Choose three.)()AThe valid cluster-id range is between 0 and 255.BJunos OS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.DA reboot is required if the cluster-id or node value is changed.EJunos OS security devices can belong to one cluster only.

考题 单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system the system is running.C It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D It creates a ping of death and can cause the entire network to be infected with a virus.

考题 单选题Which command do you use to display the status of an antivirus database update?()A show security utm anti-virus statusB show security anti-virus database statusC show security utm anti-virus databaseD show security utm anti-virus update

考题 单选题Under which Junos hierarchy level are security policies configured?()A [edit security]B [edit protocols]C [edit firewall]D [edit policy-options]

考题 单选题Which Web-filtering technology can be used at the same time as integrated Web filtering on a single branch SRX Series device?()A Websense redirect Web filteringB local Web filtering (blacklist or whitelist)C firewall user authenticationD ICAP

考题 单选题How do you apply UTM enforcement to security policies on the branch SRX series?()A UTM profiles are applied on a security policy by policy basis.B UTM profiles are applied at the global policy level.C Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.D Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.

考题 单选题The Junos OS blocks an HTTP request due to the category of the URL.Which form of Web filtering is being used?()A redirect Web filteringB integrated Web filteringC categorized Web filteringD local Web filtering

考题 多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security screen]