当前分类: JN0-332
问题:单选题A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()A The host needs ...
查看答案
问题:多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication...
问题:多选题Which two statements about Junos software packet handling are correct?()(Choose two.)AThe Junos OS applies service ALGs only for the first packet of a flow.BThe Junos OS uses fast-path processing only for the first packet of a flow.CThe Junos OS perfor...
问题:多选题Which three parameters are configured in the IKE policy? ()(Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings...
问题:多选题Which two statements are true with regard to policy ordering? ()(Choose two.)AThe last policy is the default policy, which allows all traffic.BThe order of policies is not important.CNew policies are placed at the end of the policy list.DThe insert com...
问题:单选题Which statement is true regarding NAT?()A NAT is not supported on SRX Series devices.B NAT requires special hardware on SRX Series devices.C NAT is processed in the control plane.D NAT is processed in the data plane....
问题:多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key...
问题:多选题Which two statements are true about hierarchical architecture? ()(Choose two.)AYou can assign a logical interface to multiple zones.BYou cannot assign a logical interface to multiple zones.CYou can assign a logical interface to multiple routing instanc...
问题:多选题Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)AAddresses used for NAT pools should never overlap.BIf more than one rule-set matches traffic, the rule-set with the most s...
问题:多选题Which two parameters are configured in IPsec policy? ()(Choose two.)AmodeBIKE gatewayCsecurity proposalDPerfect Forward Secrecy...
问题:单选题The SRX device receives a packet and determines that it does not match an existing session.After SCREEN options are evaluated, what is evaluated next?()A source NATB destination NATC route lookupD zone lookup...
问题:多选题Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)AIt is necessary to forward ARP requests to remote hosts.BIt is necessary when translated traffic belongs to the same subnet as the ingress interface....
问题:多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be u...
问题:单选题Which zone type can be specified in a policy?()A securityB functionalC userD system...
问题:单选题What is the proper sequence of evaluation for the SurfControl integrated Web filter solution?()A whitelists, blacklists, SurfControl categoriesB blacklists, whitelists, SurfControl categoriesC SurfControl categories, whitelists, blacklistsD SurfControl...
问题:单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to in...
问题:多选题Which three methods of source NAT does the Junos OS support?() (Choose three.)Ainterface-based source NATBsource NAT with address shiftingCsource NAT using static source poolDinterface-based source NAT without PATEsource NAT with address shifting and P...