protocol
source-address
port
application
attacks
第1题:
A. access profile
B. client group
C. client
D. default profile
E. external
第2题:
Which three packet interception methods are configurable in WX devices?() (Choose three.)
第3题:
You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()
第4题:
Which three parameters are configured in the IKE policy? ()(Choose three.)
第5题:
Which three represent IDP policy match conditions? ()(Choose three.)
第6题:
Idle
Active
Connect
Open Sent
Established
第7题:
access profile
client group
client
default profile
external
第8题:
antispam
antivirus
IPS
application firewalling
Web filtering
第9题:
activating a JUNOS Software commit script
configuring an IDP groups statement
setting up a chassis cluster
downloading the IDP policy templates
installing the policy templates
第10题:
IGP
BGP
EGP
Incomplete
Anonymous
第11题:
mode
preshared key
external interface
security proposals
dead peer detection settings
第12题:
Mark permitted traffic for firewall user authentication.
Mark permitted traffic for SCREEN options.
Associate permitted traffic with an IPsec tunnel.
Associate permitted traffic with a NAT rule.
Mark permitted traffic for IDP processing.
第13题:
Which three options represent IDP policy match conditions?()
第14题:
Which three options represent IDP policy match conditions? ()(Choose three.)
第15题:
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
第16题:
Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)
第17题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第18题:
FTP
SSH
UDP
HTTPS
Traceroute
第19题:
routing-instance
zone
interface
policy
rule-set
第20题:
transparent
auto
on
desirable
blocking
forwarding
第21题:
zone objects
policy objects
attack objects
alert and notify objects
network and address objects
第22题:
service
to-zone
attacks
port
destination-address
第23题:
protocol
source-address
port
application
attacks
第24题:
protocol
source-address
port
application
attacks