You are creating a destination NAT rule-set. Which two are valid for use with the from clause?()A、security policyB、interfaceC、routing-instanceD、IP address

You are creating a destination NAT rule-set. Which two are valid for use with the from clause?()

  • A、security policy
  • B、interface
  • C、routing-instance
  • D、IP address

相关考题:

Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?() A.Local Security PolicyB.ScwC.SeceditD.Services console

Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A Web server with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. The Web server is attached to the ge-0/0/0.0 interface of your device. You must use NAT to make the Web server reachable from the Internet using port translation.Which type of NAT must you configure?()A. source NAT with address shiftingB. pool-based source NATC. static destination NATD. pool-based destination NAT

You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service.What must you add to complete the security policy configuration?()A. The intranet-auth authentication optionB. The redirect-portal application serviceC. The uac-policy application serviceD. The ipsec-vpn tunnel

Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?() A. source portB. output interfaceC. next-hop IP addressD. source MAC addressE. destination IP addressF. next-hop MAC address

Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()A、source portB、output interfaceC、next-hop IP addressD、source MAC addressE、destination IP addressF、next-hop MAC address

The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch,there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing? ()A、source IP addressB、destination IP addressC、per-packet load balanceD、destination MAC addressE、source MAC address

Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A Web server with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. The Web server is attached to the ge-0/0/0.0 interface of your device. You must use NAT to make the Web server reachable from the Internet using port translation. Which type of NAT must you configure?()A、source NAT with address shiftingB、pool-based source NATC、static destination NATD、pool-based destination NAT

Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address andnetwork mask of 71.33.252.17/24. A webserver with IP address 10.20.20.1 isrunning an HTTP service on TCP port 8080. The webserver is attached to the ge-0/0/0.0 interface of yourdevice. You must use NAT to make the webserver reachable from the Internet using port translation.Which type of NAT must you configure?()A、source NAT with address shiftingB、pool-based source NATC、static destination NATD、pool-based destination NAT

Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()A、Local Security PolicyB、ScwC、SeceditD、Services console

Which statement describes the behavior of source NAT with address shifting?()A、Source NAT with address shifting translates both the source IP address and the source port of a packet.B、Source NAT with address shifting defines a one-to-one mapping from an original source IP address to a translated source IP address.C、Source NAT with address shifting can translate multiple source IP addresses to the same translated IP address.D、Source NAT with address shifting allows inbound connections to be initiated to the static source pool IP addresses.

You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()A、The intranet-auth authentication optionB、The redirect-portal application serviceC、The uac-policy application serviceD、The ipsec-vpn tunnel

Which of the following should be configured on a wireless router to enhance security? (Select TWO).()A、Disable DHCPB、Change wireless channelC、Disable SSID broadcastingD、Change the default username and passwordE、Use a static IP address

Which of the following types of NAT allows multiple private internal IP addresses to use a singlepublic external IP address?()A、NAT mappingB、NAT overloadingC、NAT cachingD、Static NATE、Dynamic NATF、Overlapping NAT

Which two statements are true about pool-based destination NAT?()A、It also supports PAT.B、PAT is not supported.C、It allows the use of an address pool.D、It requires you to configure an address in the junos-global zone.

You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in the Untrust zone. How do you create this policy?()A、Specify the IP address (172.19.1.1/32) as the destination address in the policy.B、Specify the DNS entry (hostb.example.com.) as the destination address in the policy.C、Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.D、Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy

You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()A、Source TCP portB、Source IP addressC、Destination TCP portD、Destination IP address

Which type of source NAT is configured in the exhibit?() [edit security nat destination] user@host# show pool A { address 10.1.10.5/32; } rule-set 1 { from zone untrust; rule 1A { match { destination-address 100.0.0.1/32; } then { destination-nat pool A; } } }A、static destination NATB、static source NATC、pool-based destination NAT without PATD、pool-based destination NAT with PAT

Which statement is true about source NAT?()A、Source NAT works only with source pools.B、Destination NAT is required to translate the reply traffic.C、Source NAT does not require a security policy to function.D、The egress interface IP address can be used for source NAT

A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)A、Use the custom application feature.B、Configure static NAT for the host.C、Use port address translation (PAT).D、Use the address-persistent option.

Which two statements are true about the primary address on an interface?()A、It is the address used by default as the local address for broadcast and multicast packets sourced locally and sent out of the interfaceB、You use the primary address when you have multiple IP addresses belonging to the same subnet on the same interfaceC、It can be useful for selecting the local address used for packets sent out of unnumbered interfaces when multiple non-127 addresses are configured on the loopback interfaceD、By default, the primary address on an interface is selected as the numerically highest local address configured on the interface

Which two actions are available in the GUI for creating location awareness rules?()A、WINS serverB、DNS serverC、IP reachabilityD、Resolve address

Which type of source NAT is configured in the exhibit?() [edit security nat source] user@host# show rule-set 1 { from interface ge-0/0/2.0; to zone untrust; rule 1A {match { destination-address 1.1.70.0/24; } then { source-nat interface; } } }A、interface-based source NATB、static source NATC、pool-based source NAT with PATD、pool-based source NAT without PAT

Which two statements about sequences are true? ()A、You use a NEXTVAL pseudo column to look at the next possible value that would be generated from a sequence, without actually retrieving the value.B、You use a CURRVAL pseudo column to look at the current value just generated from a sequence, without affecting the further values to be generated from the sequence.C、You use a NEXTVAL pseudo column to obtain the next possible value from a sequence by actually retrieving the value from the sequence.D、You use a CURRVAL pseudo column to generate a value from a sequence that would be used for a specified database column.E、If a sequence starting from a value 100 and incremented by 1 is used by more then one application, then all of these applications could have a value of 105 assigned to their column whose value is being generated by the sequence.F、You use REUSE clause when creating a sequence to restart the sequence once it generates the maximum value defined for the sequence.

单选题Which of the following types of NAT allows multiple private internal IP addresses to use a singlepublic external IP address?()ANAT mappingBNAT overloadingCNAT cachingDStatic NATEDynamic NATFOverlapping NAT

多选题Which two statements are true about pool-based destination NAT?()AIt also supports PAT.BPAT is not supported.CIt allows the use of an address pool.DIt requires you to configure an address in the junos-global zone.

多选题You are creating a destination NAT rule-set. Which two are valid for use with the from clause?()Asecurity policyBinterfaceCrouting-instanceDIP address

多选题A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)AUse the custom application feature.BConfigure static NAT for the host.CUse port address translation (PAT).DUse the address-persistent option.