单选题Which command do you use to manually remove antivirus patterns?()A request security utm anti-virus juniper-express-engine pattern-deleteB request security utm anti-virus juniper-express-engine pattern-reloadC request security utm anti-virus juniper-exp

题目
单选题
Which command do you use to manually remove antivirus patterns?()
A

request security utm anti-virus juniper-express-engine pattern-delete

B

request security utm anti-virus juniper-express-engine pattern-reload

C

request security utm anti-virus juniper-express-engine pattern-remove

D

delete security utm anti-virus juniper-express-engine antivirus-pattern


相似考题
更多“单选题Which command do you use to manually remove antivirus patterns?()A request security utm anti-virus juniper-express-engine pattern-deleteB request security utm anti-virus juniper-express-engine pattern-reloadC request security utm anti-virus juniper-exp”相关问题
  • 第1题:

    Which command do you use to manually remove antivirus patterns?()

    A. request security utm anti-virus juniper-express-engine pattern-delete

    B. request security utm anti-virus juniper-express-engine pattern-reload

    C. request security utm anti-virus juniper-express-engine pattern-remove

    D. delete security utm anti-virus juniper-express-engine antivirus-pattern


    参考答案:A

  • 第2题:

    An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()

    A. Update anti-virus, security patches, BIOS software, and then the web software.

    B. Update the web software, security patches, anti-virus, and then the BIOS.

    C. Update security patches, BIOS, web software, and then the anti-virus.

    D. The order does not matter, only one change at a time should be done.


    参考答案:C

  • 第3题:

    Which command do you use to display the status of an antivirus database update?()

    • A、show security utm anti-virus status
    • B、show security anti-virus database status
    • C、show security utm anti-virus database
    • D、show security utm anti-virus update

    正确答案:A

  • 第4题:

    An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()

    • A、Update anti-virus, security patches, BIOS software, and then the web software.
    • B、Update the web software, security patches, anti-virus, and then the BIOS.
    • C、Update security patches, BIOS, web software, and then the anti-virus.
    • D、The order does not matter, only one change at a time should be done.

    正确答案:C

  • 第5题:

    How do you apply UTM enforcement to security policies on the branch SRX series?()

    • A、UTM profiles are applied on a security policy by policy basis.
    • B、UTM profiles are applied at the global policy level.
    • C、Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.
    • D、Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.

    正确答案:A

  • 第6题:

    Which command do you issue to upgrade the current software on Junos devices?()

    • A、request system software replace
    • B、request system software install
    • C、request system software add
    • D、request system software upgrade

    正确答案:C

  • 第7题:

    Which CLI command do you use to determine which files are cleanup candidates?()

    • A、request system storage cleanup candidates
    • B、request system services storage candidates
    • C、request system services candidate cleanup
    • D、request system storage cleanup dry-run

    正确答案:D

  • 第8题:

    Your company has an Active Directory domain. You install an Enterprise Root certification authority (CA) on a member server named Server1. You need to ensure that only the Security Manager is authorized to revoke certificates that are supplied by Server1. What should you do()

    • A、Remove the Request Certificates permission from the Domain Users group.
    • B、Remove the Request Certificated permission from the Authenticated Users group.
    • C、Assign the Allow - Manage CA permission toonly  the Security Manager user Account.
    • D、Assign the Allow - Issue and Manage Certificates permission to only the Security Manger user account

    正确答案:D

  • 第9题:

    单选题
    Your company has an Active Directory domain. You install an Enterprise Root certification authority (CA) on a member server named Server1. You need to ensure that only the Security Manager is authorized to revoke certificates that are supplied by Server1. What should you do()
    A

    Remove the Request Certificates permission from the Domain Users group.

    B

    Remove the Request Certificated permission from the Authenticated Users group.

    C

    Assign the Allow - Manage CA permission toonly  the Security Manager user Account.

    D

    Assign the Allow - Issue and Manage Certificates permission to only the Security Manger user account


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which CLI command provides a summary of what the content-filtering engine has blocked?()
    A

    show security utm content-filtering statistics

    B

    show security flow session

    C

    show security flow statistics

    D

    show security utm content-filtering summary


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which command do you use to display the status of an antivirus database update?()
    A

    show security utm anti-virus status

    B

    show security anti-virus database status

    C

    show security utm anti-virus database

    D

    show security utm anti-virus update


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    All-in-one UTM security gateways are starting to displace routers in many small business networks. What does UTM stand for?()
    A

     United Threat Monitor

    B

     Universal Threat Manager

    C

     Unified Threat Management

    D

     Ultimate Threat Monitoring


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which command do you use to display the status of an antivirus database update?()

    A. show security utm anti-virus status

    B. show security anti-virus database status

    C. show security utm anti-virus database

    D. show security utm anti-virus update


    参考答案:A

  • 第14题:

    All-in-one UTM security gateways are starting to displace routers in many small business networks. What does UTM stand for?()

    • A、 United Threat Monitor
    • B、 Universal Threat Manager
    • C、 Unified Threat Management
    • D、 Ultimate Threat Monitoring

    正确答案:C

  • 第15题:

    Which CLI command provides a summary of what the content-filtering engine has blocked?()

    • A、show security utm content-filtering statistics
    • B、show security flow session
    • C、show security flow statistics
    • D、show security utm content-filtering summary

    正确答案:A

  • 第16题:

    Which command do you use to manually remove antivirus patterns?()

    • A、request security utm anti-virus juniper-express-engine pattern-delete
    • B、request security utm anti-virus juniper-express-engine pattern-reload
    • C、request security utm anti-virus juniper-express-engine pattern-remove
    • D、delete security utm anti-virus juniper-express-engine antivirus-pattern

    正确答案:A

  • 第17题:

    Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()

    • A、set content-filtering profile permit-command block-mime
    • B、set content-filtering profile block-mime
    • C、set content-filtering block-content-type block-mime
    • D、set content-filtering notifications block-mime

    正确答案:B

  • 第18题:

    Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.)

    • A、an antispam license
    • B、DNS servers configured on the SRX Series device
    • C、SMTP services on SRX
    • D、a UTM profile with an antispam configuration in the appropriate security policy
    • E、antivirus (full or express)

    正确答案:A,B,D

  • 第19题:

    You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()

    • A、set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-Spam
    • B、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-Spam
    • C、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policy
    • D、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

    正确答案:B

  • 第20题:

    单选题
    You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()
    A

    set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-Spam

    B

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-Spam

    C

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policy

    D

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system.  Which of the following is the BEST method to accomplish this?()
    A

     Update anti-virus, security patches, BIOS software, and then the web software.

    B

     Update the web software, security patches, anti-virus, and then the BIOS.

    C

     Update security patches, BIOS, web software, and then the anti-virus.

    D

     The order does not matter, only one change at a time should be done.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()
    A

    set content-filtering profile permit-command block-mime

    B

    set content-filtering profile block-mime

    C

    set content-filtering block-content-type block-mime

    D

    set content-filtering notifications block-mime


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    How do you apply UTM enforcement to security policies on the branch SRX series?()
    A

    UTM profiles are applied on a security policy by policy basis.

    B

    UTM profiles are applied at the global policy level.

    C

    Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.

    D

    Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    Which command do you use to manually remove antivirus patterns?()
    A

    request security utm anti-virus juniper-express-engine pattern-delete

    B

    request security utm anti-virus juniper-express-engine pattern-reload

    C

    request security utm anti-virus juniper-express-engine pattern-remove

    D

    delete security utm anti-virus juniper-express-engine antivirus-pattern


    正确答案: B
    解析: 暂无解析