网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()
A

[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }

B

[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }

C

[edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }

D

[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }


参考答案

参考解析
解析: 暂无解析
更多 “单选题Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()A [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }B [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }C [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }D [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }” 相关考题
考题 May I ask what the standard of your securities’ payment is?A.Each gets paid twenty Yuan per hourB.Each gets paid twelve Yuan per hourC.Thirty Yuan for each fellow per hourD.Fifteen Yuan for each security guard per hour

考题 Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A. Source IP and browserB. Source IP and certificateC. Certificate and Host CheckerD. Host Checker and source IP

考题 Which security or functional zone name has special significance to the Junos OS?() A. selfB. trustC. untrustD. junos-global

考题 Which two design goals describe the Junos OS design?() A. clean separation of security and routing policiesB. clean separation of control and forwarding planesC. modularization of multiple software processesD. a single hardware platform for all software applications

考题 A customer is looking to build a virtual desktop infrastructure on an IBM platform. What metrics will be most useful in determining the storage platform recommendation?() A. number of users, type of applications to be usedB. performance per user, network bandwidth availableC. number of users, storage capacity per user, network bandwidth availableD. number of users, number of applications per user, network bandwidth available

考题 Which statement is true regarding proxy ARP?()A、Proxy ARP is enabled by default on stand-alone JUNOS security devices.B、Proxy ARP is enabled by default on chassis clusters.C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

考题 Which two design goals describe the Junos OS design?()A、clean separation of security and routing policiesB、clean separation of control and forwarding planesC、modularization of multiple software processesD、a single hardware platform for all software applications

考题 Which security or functional zone name has special significance to the Junos OS?()A、selfB、trustC、untrustD、junos-global

考题 Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()A、JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.B、JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.C、JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.D、JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

考题 Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 Which three JUNOS software features allow for increased security on your network?()A、firewall filtersB、data encryptionC、routing protocol authenticationD、support for BGP path mtu discoveryE、automatic discovery for IPSEC neighbors

考题 Which three statements are true when working with high-availability clusters?()A、The valid cluster-id range is between 0 and 255.B、JUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.C、If the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.D、A reboot is required if the cluster-id or node value is changed.E、JUNOS security devices can belong to one cluster only.

考题 Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 Under which Junos hierarchy level are security policies configured?()A、[edit security]B、[edit protocols]C、[edit firewall]D、[edit policy-options]

考题 You are the administrator of a SQL Server 2005 computer named SQL1. You create a security template that disables unnecessary services. The template is appropriate only for SQL1. You need to ensure that the security template is applied to SQL1. Your solution must ensure that the template automatically overrides any manual configuration changes made by other administrators within an hour. What should you do?()A、Use the SQL Server Surface Area Configuration tool to import the security template.B、Use the Local Security Policy editor to import the security template into the Local Security Policy object.C、Configure Task Scheduler to import the security template by using Secedit.exe. Configure the task to run every half hour.D、Configure Task Scheduler to run the Microsoft Baseline Security Analyzer tool every half hour.

考题 You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.

考题 You use Windows 2000 Professional on your desktop Computer. You schedule a task to run an MMC snap-in to perform configuration tasks on other computers. You notice that the task is not completing correctly. You manually start MMC. You add the snap-in. You are then able to successfully run the task. You verify that all of your other tasks are working correctly. You want to enable your tasks to complete successfully. What should you do?()A、Use Scheduled Tasks to configure the task to run under the security context of your account.B、Configure the Task Scheduler service account to use a local Administrator account and password.C、Use Computer Management to start the Messenger service and to configure the Messenger service to start automatically. D、Use Computer Management to start the Task Scheduler service and to configure the Task Scheduler service to start automatically. 

考题 多选题Which three JUNOS software features allow for increased security on your network?()Afirewall filtersBdata encryptionCrouting protocol authenticationDsupport for BGP path mtu discoveryEautomatic discovery for IPSEC neighbors

考题 单选题Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()A [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }B [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }C [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }D [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }

考题 单选题A customer is looking to build a virtual desktop infrastructure on an IBM platform. What metrics will be most useful in determining the storage platform recommendation?()A number of users, type of applications to be usedB performance per user, network bandwidth availableC number of users, storage capacity per user, network bandwidth availableD number of users, number of applications per user, network bandwidth available

考题 多选题You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()AConfigure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.BConfigure a security policy that references the unified-access-control captive-portal service.CConfigure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.DConfigure a security policy that references the unified-access-control intranet-controller service.

考题 多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.

考题 多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 多选题Which two design goals describe the Junos OS design?()Aclean separation of security and routing policiesBclean separation of control and forwarding planesCmodularization of multiple software processesDa single hardware platform for all software applications

考题 单选题Your task is to provision the JUNOS security platform to permit transit packets from the Private zone to theExternal zone by using an IPsec VPN and log information at the time of session close. Which configurationmeets this requirement?()A AB BC CD D

考题 单选题You are the administrator of a Windows 2000 Professional computer.  You schedule a task to run after 15 minutes. One hour later, the task still has not run. Using the Task Scheduler you check the status of the task. The status says "Could not start". You also notice that your Event Viewer Security Log has a logon failure event. You want to run the scheduled task.  What should you do?()A Restart the RunAs service.B Verify the account and password information for the task.C Set the Task Scheduler service to allow the service to interact with the desktop.D Set the Task Scheduler service to log on as the local Administrator account.

考题 单选题Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A Source IP and browserB Source IP and certificateC Certificate and Host CheckerD Host Checker and source IP