JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.
JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.
JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.
JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.
第1题:
When should you enable Network Address Translation Transparency (NAT-T) on the Teleworker?()
第2题:
In JUNOS software, which type of VPN supports IPX and Appletalk?()
第3题:
Which three methods of source NAT does the Junos OS support?() (Choose three.)
第4题:
Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()
第5题:
Which two statements about JUNOS Software packet handling are correct?()
第6题:
Which two statements are true about pool-based source NAT? ()(Choose two.)
第7题:
VPN establishment
stateful ARP lookups
Dynamic ARP inspection
Network Address Translation
inspection of packets at higher levels (Layer 4 and above)
第8题:
Martini based VPNs
2547bis based VPNs
Sham link based VPNs
Virtual Router based VPNs
第9题:
unicast
anycast
multicast
broadcast
第10题:
MD5 authentication is supported.
A client always synchronizes to a server even when the difference between the server clock and the local clock differs by a large amount.
JUNOS software can provide a primary time reference.
The boot-server configuration allows a router to synchronize its clock when it boots up, regardless of the offset between the NTP clock source and its internal clock.
It is useful to correlate timestamps on log files and other events for troubleshooting and forensics.
第11题:
interface-based source NAT
source NAT with address shifting
source NAT using static source pool
interface-based source NAT without PAT
source NAT with address shifting and PAT
第12题:
JUNOS Software applies service ALGs only for the first packet of a flow.
JUNOS Software uses fast-path processing only for the first packet of a flow.
JUNOS Software performs route and policy lookup only for the first packet of a flow.
JUNOS Software applies SCREEN options for both first and consecutive packets of a flow.
第13题:
Which two design goals describe the Junos OS design?()
第14题:
Which two MBGP IPv4 sub-AFIs does the JUNOS software support?()
第15题:
Which three methods of source NAT does JUNOS Software support?()
第16题:
Which two statements are true about pool-based destination NAT?()
第17题:
Which two statements are true regarding IDP?()
第18题:
In JUNOS software, which type of VPN supports IPX and Appletalk?()
第19题:
It also supports PAT.
PAT is not supported.
It allows the use of an address pool.
It requires you to configure an address in the junos-global zone.
第20题:
IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
IDP inspects traffic up to the Presentation layer.
IDP inspects traffic up to the Application layer.
第21题:
Martini based VPN’s
2547bis based VPN’s
Sham link based VPN’s
Virtual Router based VPN’s
第22题:
JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.
JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.
JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.
JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.
第23题:
clean separation of security and routing policies
clean separation of control and forwarding planes
modularization of multiple software processes
a single hardware platform for all software applications
第24题:
interface-based source NAT
source NAT with address shifting
source NAT using static source pool
interface-based source NAT without PAT
source NAT with address shifting and PAT