多选题You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()AThe MAG Series device has multiple ports associated with the certificate.BThe MAG Series device's serial number needs to be configured on the SRX Series device.CThe SRX Series device must have a certificate signed by the same authority as the MAG Series device.DThe MAG Series device and SRX Series device are not synchronized to an NTP server.

多选题
You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()
A

The MAG Series device has multiple ports associated with the certificate.

B

The MAG Series device's serial number needs to be configured on the SRX Series device.

C

The SRX Series device must have a certificate signed by the same authority as the MAG Series device.

D

The MAG Series device and SRX Series device are not synchronized to an NTP server.


参考解析

解析: 暂无解析

相关考题:

You have just purchased a brand new router and wish to have the router prompt you through the initial configuration commands. Which router mode does this describe?A.ROM Monitor modeB.SETUP modeC.Autoflash modeD.RXBOOT modeE.None of the above

You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for yourproduction database. You have registered your production database and are performing regular backups.Because of a new requirement you have added a few new tablespaces to your production database and youwant them to be included in backups.Identify two options for completing this task. ()(Choose two.)A. Reregistering the target database in recovery catalogB. Transporting the new tablespaces to the recovery catalog databaseC. Syncronizing the recovery catalog with the target database control fileD. Performing a fresh backup of the target database to include the new data files in the catalog database

When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?() A. The cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.B. The cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.C. The cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.D. The cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A. You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B. No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C. You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D. You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?() A. Remote DebuggingB. System SnapshotC. User Access logsD. Policy Tracing

Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from Maintenance ImportfExport Configuration and user.cfg from Maintenance Import/Export Users. When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file.Which three configuration areas were updated by system.cfg?()A. Cluster configuration settingsB. Static routesC. SNMP settingsD. Sign-in policiesE. MAC authentication realms

You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()A. Resource access policy on the MAG Series deviceB. IPsec routing policy on the MAG Series deviceC. General traffic policy blocking access through the firewall enforcerD. Auth table entry on the firewall enforcer

Performing a series of trial runs before launching large-scale production of any new product is common _____at Juvo, Inc.A. usage B. ground C. practice D. manner

You have just purchased a brand new router and wish to have the router prompt you through the initial configuration commands. Which router mode does this describe?()A、ROM Monitor modeB、SETUP modeC、Autoflash modeD、RXBOOT modeE、None of the above

Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()A、You may use Cisco Network Assistant to set up the initial configurationB、You must use CLI for initial configurationC、You may use either CLI or CAN for configurationD、You may make a direct connection to the PC from any point on the switchE、You may only make a direct connection from the port with the flashing green LED to the PC

You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A、The user will be instructed to call the network administrator.B、The user will fail authentication.C、The user will be prompted to install a new device certificate on the MAG Series device.D、The user will successfully authenticate and have full network access.

You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()A、The MAG Series device has multiple ports associated with the certificate.B、The MAG Series device's serial number needs to be configured on the SRX Series device.C、The SRX Series device must have a certificate signed by the same authority as the MAG Series device.D、The MAG Series device and SRX Series device are not synchronized to an NTP server.

You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for your production database. You have registered your production database and are performing regular backups. Because of a new requirement you have added a few new tablespaces to your production database and you want them to be included in backups.  Identify two options for completing this task.()A、 Reregistering the target database in recovery catalogB、 Transporting the new tablespaces to the recovery catalog databaseC、 Syncronizing the recovery catalog with the target database control fileD、 Performing a fresh backup of the target database to include the new data files in the catalog database

You are using a recovery catalog to maintain Recovery Manager (RMAN) backup information for yourproduction database. You have registered your production database and are performing regular backups. Because of a new requirement you have added a few new tablespaces to your production database and youwant them to be included in backups.Identify two options for completing this task. ()(Choose two.)A、Reregistering the target database in recovery catalogB、Transporting the new tablespaces to the recovery catalog databaseC、Syncronizing the recovery catalog with the target database control fileD、Performing a fresh backup of the target database to include the new data files in the catalog database

You have an Exchange Server 2010 Mailbox server.The server is a member of a database availability group (DAG).The server fails.You install the operating system on a new server and use the same computer name.You join the server to the domain.You need to reinstall Exchange Server 2010 on the server.The solution must ensure that previous Exchange server configurations are applied to the new server.What should you do?()A、Run setup /RecoverCMSB、Run setup /m:RecoverServerC、Restore the system state from the previous serverD、Install the Exchange management tools and then run the Restore-Computer cmdlet

You work as an Exchange Administrator for TechWorld Inc.The company has a Windows 2008 Active Directory-based contains an Exchange Server 2003 organization.The management instructs you to deploy Exchange Server 2010 ii to prepare the schema and domain first.Which of the following commands should you run prior to performing then preparation?()A、Setup /PrepareADB、Setup /PrepareSchemaC、Setup/PrepareLegacyExchangePermissions:child.techworld.comD、Setup /PrepareLegacyExchangePermissions

The company has a Windows 2008 Active Directory-based network.The network contains an Exchange Server 2003 organization.The management instructs you to deploy Exchange Server 2010 in your network.You decide to prepare the schema and domain first.Which of the following commands should you run prior to performing the normal schema and domain preparation?()A、Setup /PrepareSchemaB、Setup /PrepareLegacyExchangePermissionsC、Setup /PrepareADD、Setup /PrepareLegacyExchangePermissions:child.Xxx

单选题You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()AApply the new license to the passive node of the cluster.BConfigure an external load balancer to hold the V IP.CDisable the active node in the cluster.DRemove the IF-MAP server configuration.

单选题Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()AAdmin loggingBSNMP loggingCSyslog server loggingDEvent logging

单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has Terminal Server installed. You have a new multi-user application that you plan to install on the server. The setup program for the application is named setup.exe. You need to install the application on the server. You must ensure that the application can be used by all users. What should you do? ()AFrom the command prompt, run setup.exe.BFrom Add or Remove Programs, add a new program.CIn Windows Explorer, use the Run As option to run setup.exe.DIn Windows Explorer, use Compatibility mode to run setup.exe.

多选题You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()AResource access policy on the MAG Series deviceBIPsec routing policy on the MAG Series deviceCGeneral traffic policy blocking access through the firewall enforcerDAuth table entry on the firewall enforcer

多选题Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?()ARemote DebuggingBSystem SnapshotCUser Access logsDPolicy Tracing

单选题When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()AThe cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.BThe cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.CThe cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.DThe cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()AThe user will be instructed to call the network administrator.BThe user will fail authentication.CThe user will be prompted to install a new device certificate on the MAG Series device.DThe user will successfully authenticate and have full network access.

多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.

多选题Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from "Maintenance" "ImportfExport Configuration" and user.cfg from "Maintenance" "Import/Export Users". When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file. Which three configuration areas were updated by system.cfg?()ACluster configuration settingsBStatic routesCSNMP settingsDSign-in policiesEMAC authentication realms

单选题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()AYou must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.BNo security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.CYou must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.DYou must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.