Under which Junos hierarchy level are security policies configured?()
第1题:
A. MD5 authentication is supported by the Junos OS
B. Server mode is not supported by the Junos OS
C. The Junos OS can provide a primary time reference
D. The Junos OS does not support the use of a boot server
第2题:
A. You must set the vlan-tagging parameter under the [edit interfaces ge-0/0/1] hierarchy.
B. You must use the rename command to change unit 100 to unit 0.
C. You must set the encapsulation flexible-ethernet-services parameter under the [edit interfaces ge-0/0/1] hierarchy.
D. You must set the encapsulation vlan-ccc parameter under the [edit interfaces ge-0/0/1 unit 100] hierarchy.
第3题:
Which security or functional zone name has special significance to the Junos OS?()
第4题:
hans is designing the reviews application. the application will include two forms :review and response, in the view ,the response documents do not appear under the review documents from which they were created, what could be causing this to happen .()
第5题:
Which statement is true regarding the Network Time Protocol (NTP) on Junos devices?()
第6题:
Which statement is true regarding the Junos OS?()
第7题:
MD5 authentication is supported by the Junos OS
Server mode is not supported by the Junos OS
The Junos OS can provide a primary time reference
The Junos OS does not support the use of a boot server
第8题:
[edit security]
[edit protocols]
[edit firewall]
[edit policy-options]
第9题:
[edit security idp]
[edit security zones security-zone trust interfaces ge-0/0/0.0]
[edit security zones security-zone trust]
[edit security screen]
第10题:
Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Configure a wired adapter and assign the required SSID under User Roles > Agent > Odyssey Settings.
Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
第11题:
local
OSPF
direct
BGP
第12题:
MD5 authenticaton is supported by the Junos OS
Server mode is not supported by the Junos OS
The Junos OS can provide a primarytime reference
The Junos OS does not support the use of a boot server
第13题:
A. Static routes are defined at the [edit routing-instances] hierarchy.
B. Static routes must have a next hop defined.
C. Static routes remain in the routing table until you remove them or until they become inactive.
D. Static routes are learned by neighboring devices and added to their routing tables.
第14题:
A.local
B.OSPF
C.direct
D.BGP
第15题:
Which statement is true regarding the Junos OS?()
第16题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
第17题:
How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()
第18题:
Which statement is correct regarding the Junos OS?()
第19题:
Static routes are defined at the [edit routing-instances] hierarchy.
Static routes must have a next hop defined.
Static routes remain in the routing table until you remove them or until they become inactive.
Static routes are learned by neighboring devices and added to their routing tables.
第20题:
The Junos kernel is based on the Solaris operating system
The Junos kernel is based on the GNU Zebra operating system
The Junos kernel is completely original and not based on any other operating system
The Junos kernel is based on the FreeBSD UNIX operating system
第21题:
By adding two separate connections in the connections dialog box
By adding two separate intranet Controllers under the configuration hierarchy
By adding one intranet Controller and one SA under the configuration hierarchy
By adding two URLs under a connection in the connections dialog box
第22题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第23题:
[edit access]
[edit security access]
[edit firewall access]
[edit firewall-authentication]