网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)

  • A、routing-instance
  • B、zone
  • C、interface
  • D、policy
  • E、rule-set

参考答案

更多 “Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)A、routing-instanceB、zoneC、interfaceD、policyE、rule-set” 相关考题
考题 Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.) A. routing-instanceB. zoneC. interfaceD. policyE. rule-set

考题 Which three options represent IDP policy match conditions? ()(Choose three.) A.serviceB.to-zoneC.attacksD.portE.destination-address

考题 Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.) A. an antispam licenseB. DNS servers configured on the SRX Series deviceC. SMTP services on SRXD. a UTM profile with an antispam configuration in the appropriate security policyE. antivirus (full or express)

考题 Which three parameters are configured in the IKE policy? ()(Choose three.) A. modeB. preshared keyC. external interfaceD. security proposalsE. dead peer detection settings

考题 Which three methods of source NAT does the Junos OS support?() (Choose three.) A. interface-based source NATB. source NAT with address shiftingC. source NAT using static source poolD. interface-based source NAT without PATE. source NAT with address shifting and PAT

考题 The Origin attribute describes the source of the BGP prefix.Which three are valid Origin codes?() (Choose three.) A.IGPB.BGPC.EGPD.IncompleteE.Anonymous

考题 What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。 A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address

考题 Which of the following are key characteristics of PPP (Choose three.)()。A、can be used over analog circuitsB、maps Layer 2 to Layer 3 addressC、encapsulates several routed protocolsD、supports IP onlyE、provides error correction

考题 Which three methods of source NAT does the Junos OS support?() (Choose three.)A、interface-based source NATB、source NAT with address shiftingC、source NAT using static source poolD、interface-based source NAT without PATE、source NAT with address shifting and PAT

考题 Which three options represent IDP policy match conditions? ()(Choose three.)A、serviceB、to-zoneC、attacksD、portE、destination-address

考题 What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address

考题 The Origin attribute describes the source of the BGP prefix. Which three are valid Origin codes?() (Choose three.)A、IGPB、BGPC、EGPD、IncompleteE、Anonymous

考题 What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

考题 Which three parameters are configured in the IKE policy? ()(Choose three.)A、modeB、preshared keyC、external interfaceD、security proposalsE、dead peer detection settings

考题 Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.)A、an antispam licenseB、DNS servers configured on the SRX Series deviceC、SMTP services on SRXD、a UTM profile with an antispam configuration in the appropriate security policyE、antivirus (full or express)

考题 Which statement is true about source NAT?()A、Source NAT works only with source pools.B、Destination NAT is required to translate the reply traffic.C、Source NAT does not require a security policy to function.D、The egress interface IP address can be used for source NAT

考题 Which three represent IDP policy match conditions? ()(Choose three.)A、protocolB、source-addressC、portD、applicationE、attacks

考题 Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)A、Addresses used for NAT pools should never overlap.B、If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.C、If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.D、Dynamic source NAT rules take precedence over static source NAT rules.

考题 多选题Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN (Choose three.)()。AHDLCBEthernetCToken RingDPPPEFDDIFFrame Relay

考题 多选题Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)Arouting-instanceBzoneCinterfaceDpolicyErule-set

考题 多选题Which are valid modes for a switch port used as a VLAN trunk (Choose three.)()。AtransparentBautoConDdesirableEblockingFforwarding

考题 多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

考题 多选题Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)Aflags indicating the kind of autoconfiguration that can be done by hostsBdefault router informationC/64 prefix that can be used on the link and the lifetime of the prefixDIPv6 DHCP server address information

考题 多选题The Origin attribute describes the source of the BGP prefix. Which three are valid Origin codes?() (Choose three.)AIGPBBGPCEGPDIncompleteEAnonymous

考题 多选题Which three options represent IDP policy match conditions? ()(Choose three.)AserviceBto-zoneCattacksDportEdestination-address

考题 多选题Which three methods of source NAT does the Junos OS support?() (Choose three.)Ainterface-based source NATBsource NAT with address shiftingCsource NAT using static source poolDinterface-based source NAT without PATEsource NAT with address shifting and PAT

考题 多选题Which three represent IDP policy match conditions? ()(Choose three.)AprotocolBsource-addressCportDapplicationEattacks