ping
FTP
Telnet
HTTP
HTTPS
第1题:
A. ping
B. FTP
C. Telnet
D. HTTP
E. HTTPS
第2题:
Which three statistics does the Executive report summarize?() (Choose three.)
第3题:
Which two traffic types trigger pass-through firewall user authentication?()
第4题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第5题:
Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)
第6题:
buffering
cut-through
windowing
congestion avoidance
load balancing
第7题:
HDLC
Ethernet
Token Ring
PPP
FDDI
Frame Relay
第8题:
block Flash
block Java applets
block ActiveX
block EXE files
block MIME type
第9题:
latency and loss
compression results
traffic (by application)
CRC and alignment errors
user access (by username)
第10题:
point-to-point
parent/child messaging
messaging hub system
distributed applications messaging
simple object access protocol (SOAP) messaging
第11题:
MIME pattern
file extension
IP spoofing
POP3
protocol command
第12题:
Mark permitted traffic for firewall user authentication.
Mark permitted traffic for SCREEN options.
Associate permitted traffic with an IPsec tunnel.
Associate permitted traffic with a NAT rule.
Mark permitted traffic for IDP processing.
第13题:
A. 3577 UDP
B. 3578 UDP
C. 3678 UDP
D. 3577 TCP
E. 3578 TCP
第14题:
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
第15题:
Which three advanced permit actions within security policies are valid?() (Choose three.)
第16题:
Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)
第17题:
Which three types of integration does the Business Event System support?() (Choose three.)
第18题:
SSH
Telnet
ICMP
OSPF
HTTP
第19题:
ping
FTP
Telnet
HTTP
HTTPS
第20题:
access profile
client group
client
default profile
external
第21题:
onboard VPN accelerator
events correlation and proactive response
high-performance AIM VPN modules
virtual firewall
Cisco lOS Firewall and lOS IPS
transparent firewall
第22题:
When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第23题:
Fast Connection Setup
TCP Acceleration (AFP)
Network Sequence Caching
AppFlow's MAPI acceleration
Molecular Sequence Reduction
第24题:
3577 UDP
3578 UDP
3678 UDP
3577 TCP
3578 TCP