站内搜索
JN0-332 问题列表
问题
单选题Which UTM feature requires a license to function?()A
integrated Web filteringB
local Web filteringC
redirect Web filteringD
content filtering
问题
单选题What is the correct syntax for applying node-specific parameters to each node in a chassis cluster?()A
set apply-groups node$B
set apply-groups (node)C
set apply-groups $(node)D
set apply-groups (node)all
问题
单选题Which statement is correct about HTTP trickling?()A
It prevents the HTTP client or server from timing-out during an antivirus updateB
It prevents the HTTP client or server from timing-out during antivirus scanning.C
It is an attack.D
It is used to bypass antivirus scanners.
问题
多选题Which three statements are true when working with high-availability clusters? (Choose three.)()AThe valid cluster-id range is between 0 and 255.BJunos OS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.DA reboot is required if the cluster-id or node value is changed.EJunos OS security devices can belong to one cluster only.
问题
多选题Which two statements are true with regard to policy ordering? ()(Choose two.)AThe last policy is the default policy, which allows all traffic.BThe order of policies is not important.CNew policies are placed at the end of the policy list.DThe insert command can be used to change the order.
问题
单选题A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()A
The host needs to open the telnet port.B
The host needs a route for the translated address.C
The administrator must use a proxy-arp policy for the translated address.D
The administrator must use a security policy, which will allow communication between the zones.
问题
多选题What are two rulebase types within an IPS policy on an SRX Series device?() (Choose two.)Arulebase-ipsBrulebase-ignoreCrulebase-idpDrulebase-exempt
问题
多选题Which three parameters are configured in the IKE policy? ()(Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings
问题
多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal
问题
单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()A
from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B
from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C
from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D
from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
问题
单选题Which type of Web filtering by default builds a cache of server actions associated with each URL it has checked?()A
Websense Redirect Web filteringB
integrated Web filteringC
local Web filteringD
enhanced Web filtering
问题
多选题Which two statements are true about hierarchical architecture? ()(Choose two.)AYou can assign a logical interface to multiple zones.BYou cannot assign a logical interface to multiple zones.CYou can assign a logical interface to multiple routing instances.DYou cannot assign a logical interface to multiple routing instances.
问题
单选题Which statement describes a security zone?()A
A security zone can contain one or more interfaces.B
A security zone can contain interfaces in multiple routing instances.C
A security zone must contain two or more interfaces.D
A security zone must contain bridge groups.
问题
单选题What is the purpose of a chassis cluster?()A
Chassis clusters are used to aggregate routes.B
Chassis clusters are used to create aggregate interfaces.C
Chassis clusters are used to group two chassis into one logical chassis.D
Chassis clusters are used to group all interfaces into one cluster interface.
问题
多选题Which two statements are true with regard to policy ordering? ()(Choose two.)AThe last policy is the default policy, which allows all traffic.BThe order of policies is not important.CNew policies are placed at the end of the policy list.DThe insert command can be used to change the order.