当前分类: JN0-330
问题:单选题Click the Exhibit button. Which type of source NAT is configured in the exhibit?()A static source poolB interface source poolC source pool with PATD souce pool without PAT...
查看答案
问题:单选题A route-based VPN is required for which scenario? ()A when the remote VPN peer is behind a NAT deviceB when multiple networks need to be reached across the tunnelC when the remote VPN peer is a dialup or remote access clientD when a dynamic routing pro...
问题:单选题Click the Exhibit button. Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2. Which is a potential cause for this problem?()A The untrust zone does not have a management policy configured.B The trust zone does not have ping enabled as ...
问题:多选题In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)AIP protocolBIP time-to-liveCsource and destination IP addressDsource and destination MAC addressEsource and d...
问题:单选题Click the Exhibit button. In the exhibit, what is the priority for Router B in VRRP group 100?()A 1B 100C 110D 255...
问题:单选题Click the Exhibit button. In the exhibit, which statement is correct? ()A Three physical interfaces are redundant.B You must define an additional Redundancy Group.C node 0 will immediately become primary in the cluster.D You must issue an operation...
问题:单选题Which statement is true about interface-based static NAT? ()A It also supports PAT.B It requires you to configure address entries in the junos-nat zone.C It requires you to configure address entries in the junos-global zone.D The IP addresses being tra...
问题:单选题You are not able to telnet to the interface IP of your JUNOS software with enhanced services devicefrom a PC on the same subnet. What is causing the problem? ()A Telnet is not being permitted by self policy.B Telnet is not being permitted by security p...
问题:单选题Based on the configuration shown in the exhibit, what will happen to the traffic matching the security policy?()A The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.B The traffic is permitted through the myTunnel IPSec tunnel...
问题:多选题Users can define policy to control traffic flow between which two components? ()(Choose two.)Afrom a zone to the router itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface...
问题:单选题Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/...
问题:多选题Which two statements regarding asymmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different ke...
问题:多选题Which three parameters are configured in the IKE policy?() (Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings...