多选题Which two Junos platforms provide stateful firewall functionality?()AMX SeriesBEX SeriesCSRX SeriesDQFX Series

多选题
Which two Junos platforms provide stateful firewall functionality?()
A

MX Series

B

EX Series

C

SRX Series

D

QFX Series


参考解析

解析: 暂无解析

相关考题:

Which three functions are provided by the Junos OS for security platforms?()(Choose three.) A. VPN establishmentB. stateful ARP lookupsC. Dynamic ARP inspectionD. Network Address TranslationE. inspection of packets at higher levels (Layer 4 and above)

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()A. CLIB. WebUIC. NSMD. Junos Pulse Access Control Service

A traditional router is better suited than a firewall device for which function? () A. VPN establishmentB. packet-based forwardingC. stateful packet processingD. network address translation

Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.) A. rate limiting of ICMPB. RADIUS authorizationsC. source address validationD. stateful firewall on the router

Which two Junos platforms provide stateful firewall functionality?() A. MX SeriesB. EX SeriesC. SRX SeriesD. QFX Series

A Stateful firewall is MOST useful in protecting against which of the following network scans?() A.PINGB.UDPC.XmasD.ACK

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?() A. fewer devices to manageB. moderate-to-high scalabilityC. stateful inspection of decrypted VPN trafficD. increased bandwidth with additional interfacesE. decreased complexity as traffic is filtered from the firewall

Which three functions are provided by JUNOS Software for security platforms?()A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)

Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()A、Stateful firewallB、Proxy firewallC、Packet filtering firewallD、Stateless firewall

Which two statements are correct about firewall filters in the Junos OS?()A、Firewall filters are stateless.B、Firewall filters are used to control routing information that is exchanged between devices.C、Firewall filters are used to control traffic passing through the device.D、Firewall filters can only be applied to traffic entering the device.

A traditional router is better suited than a firewall device for which function?()A、VPN establishmentB、packet-based forwardingC、stateful packet processingD、Network Address Translation

Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()A、JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.B、JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.C、JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.D、JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

Which statement is true regarding the Junos OS?()A、All platforms running the Junos OS use the same source code baseB、All platforms running the Junos OS use the same PFEC、All platforms running the Junos OS use a hard drive to optimize syslog data storageD、All platforms running the Junos OS use a separate process with protected memory space for each routing protocol

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()A、fewer devices to manageB、moderate-to-high scalabilityC、stateful inspection of decrypted VPN trafficD、increased bandwidth with additional interfacesE、decreased complexity as traffic is filtered from the firewall

A Stateful firewall is MOST useful in protecting against which of the following network scans?()A、PINGB、UDPC、XmasD、ACK

Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

Which three functions are provided by the Junos OS for security platforms?()(Choose three.)A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()A、CLIB、WebUIC、NSMD、Junos Pulse Access Control Service

Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)A、rate limiting of ICMPB、RADIUS authorizationsC、source address validationD、stateful firewall on the router

单选题Which statement is true regarding the Junos OS?()AAll platforms running the Junos OS have identical factory-default configurationsBAll platforms running the Junos OS use the IP2 processor for longest-match lookupCAll platforms running the Junos OS use the same source code baseDAll platforms running the Junos OS use FXP1 for communication between control and forwarding planes

单选题Which statement is true regarding the Junos OS?()AAll platforms running the Junos OS separate the functions of learning and flooding.BAll platforms running the Junos OS separate the functions of control and forwarding.CAll platforms running the Junos OS separate the functions of routing and bridging.DAll platforms running the Junos OS separate the functions of management and routing.

多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

单选题Which statement is true regarding the Junos OS?()AAll platforms running the Junos OS have identical factory-default configurations.BAll platforms running the Junos OS use the IP2 processor for longest-match lookup.CAll platforms running the Junos OS use the same source code base.DAll platforms running the Junos OS use FXP1 for communication between control and forwarding planes.

多选题Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()ARADIUSBTACACS+CLDAPDIIS

单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()AVIP is not required when using only agentless access for all endpoint platforms.BVIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.CVIP is not required when using Junos Pulse and agentless access for all endpoint platforms.DVIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.