多选题Which three functions are provided by the Junos OS for security platforms?()(Choose three.)AVPN establishmentBstateful ARP lookupsCDynamic ARP inspectionDNetwork Address TranslationEinspection of packets at higher levels (Layer 4 and above)
多选题
Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
A
VPN establishment
B
stateful ARP lookups
C
Dynamic ARP inspection
D
Network Address Translation
E
inspection of packets at higher levels (Layer 4 and above)
参考解析
解析:
暂无解析
相关考题:
Which three options represent IDP policy match conditions? ()(Choose three.) A.serviceB.to-zoneC.attacksD.portE.destination-address
Which three functions are provided by the Junos OS for security platforms?()(Choose three.) A. VPN establishmentB. stateful ARP lookupsC. Dynamic ARP inspectionD. Network Address TranslationE. inspection of packets at higher levels (Layer 4 and above)
Which three methods of source NAT does the Junos OS support?() (Choose three.) A. interface-based source NATB. source NAT with address shiftingC. source NAT using static source poolD. interface-based source NAT without PATE. source NAT with address shifting and PAT
Which three functions are provided by JUNOS Software for security platforms?()A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)
Which statement is true regarding proxy ARP?()A、Proxy ARP is enabled by default on stand-alone JUNOS security devices.B、Proxy ARP is enabled by default on chassis clusters.C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled
Which three methods of source NAT does the Junos OS support?() (Choose three.)A、interface-based source NATB、source NAT with address shiftingC、source NAT using static source poolD、interface-based source NAT without PATE、source NAT with address shifting and PAT
Which statement is true regarding the Junos OS?()A、All platforms running the Junos OS separate the functions of learning and flooding.B、All platforms running the Junos OS separate the functions of control and forwarding.C、All platforms running the Junos OS separate the functions of routing and bridging.D、All platforms running the Junos OS separate the functions of management and routing.
Which three options represent IDP policy match conditions? ()(Choose three.)A、serviceB、to-zoneC、attacksD、portE、destination-address
Which statement is true regarding the Junos OS?()A、All platforms running the Junos OS use the same source code baseB、All platforms running the Junos OS use the same PFEC、All platforms running the Junos OS use a hard drive to optimize syslog data storageD、All platforms running the Junos OS use a separate process with protected memory space for each routing protocol
Which three statements are true about DAI?()A、DAI intercept all ARP packets on untrusted portsB、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.C、DAI is used to prevent against a DHCP Snooping attack.D、DAI forwards all ARP packets received on a trusted interface without any checks.E、DAI forwards all ARP packets on untrusted ports.F、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
Which three statements are true when working with high-availability clusters? (Choose three.)()A、The valid cluster-id range is between 0 and 255.B、Junos OS security devices can belong to more than one cluster if cluster virtualization is enabled.C、If the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.D、A reboot is required if the cluster-id or node value is changed.E、Junos OS security devices can belong to one cluster only.
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)A、NATB、OSPFC、SNMPD、SCREEN options
Which statement is true regarding the Junos OS?()A、All platforms running the Junos OS have identical factory-default configurationsB、All platforms running the Junos OS use the IP2 processor for longest-match lookupC、All platforms running the Junos OS use the same source code baseD、All platforms running the Junos OS use FXP1 for communication between control and forwarding planes
Which two statements are true regarding proxy ARP?()A、Proxy ARP is enabled by default.B、Proxy ARP is not enabled by default.C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled
Which three functions are provided by the Junos OS for security platforms?()(Choose three.)A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)
多选题Which three functions are provided by JUNOS Software for security platforms?()AVPN establishmentBstateful ARP lookupsCDynamic ARP inspectionDNetwork Address TranslationEinspection of packets at higher levels (Layer 4 and above)
多选题Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN (Choose three.)()。AHDLCBEthernetCToken RingDPPPEFDDIFFrame Relay
多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal
多选题Which three statements are true about DAI?()ADAI intercept all ARP packets on untrusted portsBDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.CDAI is used to prevent against a DHCP Snooping attack.DDAI forwards all ARP packets received on a trusted interface without any checks.EDAI forwards all ARP packets on untrusted ports.FDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects
多选题Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)ANATBOSPFCSNMPDSCREEN options
多选题Which three options represent IDP policy match conditions? ()(Choose three.)AserviceBto-zoneCattacksDportEdestination-address
多选题Which three methods of source NAT does the Junos OS support?() (Choose three.)Ainterface-based source NATBsource NAT with address shiftingCsource NAT using static source poolDinterface-based source NAT without PATEsource NAT with address shifting and PAT
多选题Which three statements are true when working with high-availability clusters? (Choose three.)()AThe valid cluster-id range is between 0 and 255.BJunos OS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.DA reboot is required if the cluster-id or node value is changed.EJunos OS security devices can belong to one cluster only.
单选题Which statement is true regarding proxy ARP?()AProxy ARP is enabled by default on stand-alone JUNOS security devices.BProxy ARP is enabled by default on chassis clusters.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled
多选题Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()ARouter A is responsible for answering ARP requests sent to the virtual IP address.BIf Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router ACIf another router were added to this GLBP group, there would be two backup AVGsDRouter B is in GLBP listen state.ERouter A alternately responds to ARP requests with different virtual MAC addresses.FRouter B will transition from blocking state to forwarding state when it becomes the AVG