mode
preshared key
external interface
security proposals
dead peer detection settings
第1题:
A. access profile
B. client group
C. client
D. default profile
E. external
第2题:
What are three valid LDP message types? ()(Choose three.)
第3题:
Which two parameters are configured in IPsec policy?()
第4题:
Which three options represent IDP policy match conditions? ()(Choose three.)
第5题:
Which three locations in WebView allow you to confirm that the endpoints are configured properly? ()(Choose three.)
第6题:
Which two parameters are configured in IPsec policy? ()(Choose two.)
第7题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第8题:
Idle
Active
Connect
Open Sent
Established
第9题:
access profile
client group
client
default profile
external
第10题:
mode
preshared key
external interface
security proposals
dead peer detection settings
第11题:
mode
IKE gateway
security proposal
Perfect Forward Secrecy
第12题:
ISATAP
NATV6
manually configured overlay tunnels
dual stack configurations
第13题:
A. Monitor > Endpoints
B. Acceleration > Endpoints
C. Device Setup > Endpoints
D. Compression > Endpoints
E. Admin > Maintenance > Display Configuration
第14题:
Which three parameters are configured in the IKE policy?()
第15题:
Which three packet interception methods are configurable in WX devices?() (Choose three.)
第16题:
Which three of these items are IPv6 transition mechanisms? ()(Choose three.)
第17题:
Which three parameters are configured in the IKE policy? ()(Choose three.)
第18题:
Which three represent IDP policy match conditions? ()(Choose three.)
第19题:
an antispam license
DNS servers configured on the SRX Series device
SMTP services on SRX
a UTM profile with an antispam configuration in the appropriate security policy
antivirus (full or express)
第20题:
FTP
SSH
UDP
HTTPS
Traceroute
第21题:
Monitor > Endpoints
Acceleration > Endpoints
Device Setup > Endpoints
Compression > Endpoints
Admin > Maintenance > Display Configuration
第22题:
service
to-zone
attacks
port
destination-address
第23题:
mode
preshared key
external interface
security proposals
dead peer detection settings
第24题:
protocol
source-address
port
application
attacks