You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()A、access profileB、IKE parametersC、tunneled interfaceD、redirect policy

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

  • A、access profile
  • B、IKE parameters
  • C、tunneled interface
  • D、redirect policy

相关考题:

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?() A. access profileB. IKE parametersC. tunneled interfaceD. redirect policy

You are configuring a PPP over Ethernet service offering.Which two type s of interfaces can be dynamically created with aprofile?() A.IPB.ATMC.PPPoAD.PPPoE

You are configuring an RF group of controllers that coordinate Radio Resource Managementcalculations. What is the maximum number of WLAN controllers that you can add?()A、17B、20C、12D、24

You are configuring an RF group of controllers that coordinate Radio Resource Management calculations. What is the maximum number of WLAN controllers that you can add?()A、12B、17C、20D、24

You are configuring a JMS server with a need for load balancing the messages. To achieve the  load balance you should ().A、use regular queues and topics  B、use distributed queues and topicsC、not use subdeploymentsD、disable server affinityE、use message paging

You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()A、You should consider configuring recipient filtering.B、You should consider configuring sender reputation.C、You should consider configuring content filtering.D、You should consider configuring sender filtering.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()A、You should create a discover imageB、You should create an install imageC、You should create a capture imageD、You should create a CD-ROM that contains PXE drivers

You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()A、The user permissions on the zone should be granted.B、The user permissions on the DNS zone should be granted.C、The user should be added to the DNSUpdateProxy Global security group.D、The user should be added to the DNSAdmins domain local security group.

ou work as an administrator at ABC.com. The ABC.com network consists of an Active Directory forest that contains a root domain, named ABC.com, and two child domains, named us.ABC.com and uk.ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The root domain hosts a domain local distribution group, named ABCGroup. You are preparing to issue ABCGroup read-only access to a shared folder hosted by the us.ABC.com domain. You want to make sure that ABCGroup is able to access the shared folder in the us.ABC.com domain.  Which of the following actions should you take?()A、You should consider re-configuring ABCGroup as a universal Admins group.B、You should consider re-configuring ABCGroup as a universal security group.C、You should consider re-configuring ABCGroup as a global administrators group.D、You should consider re-configuring ABCGroup as a local administrators group.

Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows  Server 2012 R2 installed.You have installed the DNS Server Role on a ABC.com server, named ABC-SR13. ABC.com’s workstations make use of a web proxy to access the Internet, and refer to ABC-SR13 as a primaryDNS server.You have been instructed to make sure that Internet host names for ABC.com’s workstations are not resolved by ABC-SR13.  Which of the following actions should you take?()A、You should consider configuring a primary zone on ABC-SR13.B、You should consider configuring a secondary zone on ABC-SR13.C、You should consider configuring a reverse lookup zone on ABC-SR13.D、You should consider configuring a forward lookup zone on ABC-SR13.

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to modify the name of the local Administrator account on all ABC.com workstations. You want to achieve this using as little administrative effort as possible. Which of the following actions should you take?()A、You should consider configuring the Security Options settings via the Group Policy Management Console (GPMC).B、You should consider configuring the Security Options settings via Server Manager.C、You should consider configuring the replication settings.D、You should consider navigating to Local Users and Groups via Computer Management on each workstation.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The server hasthe Hyper-V server role installed. Now you receive an order from the company management. According tothe company requirement, you have to merge a differencing disk and a parent disk. What action should you perform?()A、The differencing disk should be inspected.B、The parent disk should be edited.C、The parent disk should be inspected.D、The differencing disk should be edited.

You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

单选题You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()AYou should use /63.BYou should use /64.CYou should use /61.DYou should use /62.

单选题You work as the exchange administrator at Company.com.the Company.com network contains an exchange server 2010 organization.Company.com has its headquarters in stockholm where you are located.you are responsible for an exchange 2010 edge transport server named -ex01.during the course of the week you receive an instruction from the cio to make sure that e-mail messages sent to unknown addresses in the organization is rejected automatically.What should you do?()AYou should consider configuring recipient filtering.BYou should consider configuring sender reputation.CYou should consider configuring content filtering.DYou should consider configuring sender filtering.

单选题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()AWhen you want all unauthenticated traffic to be redirectedBWhen you want all clear text traffic to be redirected.CWhen you want all authenticated traffic to be redirected.DWhen you want all encrypted traffic to be redirected.

单选题You are configuring a Windows Server 2008 R2 Hyper-V server. You need to audit changes to Hyper-V roles and authorization rights. Which file should you audit?()AAzMan.mscBInitial Store.xmlCmachine.configDWeb.config

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()AYou should create a discover imageBYou should create an install imageCYou should create a capture imageDYou should create a CD-ROM that contains PXE drivers

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed. Some of ABC.com’s workstations have Windows 7 installed, while the rest have Windows 8 installed.  After installing a new Windows Server 2012 R2 computer in the ABC.com domain, you configure it to run the File and Storage Services server role.You are instructed to create a shared folder on the new server, and configure the use of Previous Versions for restoring files located in the shared folder.  Which of the following actions should you take?()AYou should consider configuring the Shadow Copies settings on the new server.BYou should consider configuring the Snapshot settings on the new server.CYou should consider configuring the Background Copy settings on the new server.DYou should consider configuring the Permission settings on the new server.

多选题You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()Aaccess profileBIKE parametersCtunneled interfaceDredirect policy

多选题You are configuring a PPP over Ethernet service offering.Which two type s of interfaces can be dynamically created with aprofile?()AIPBATMCPPPoADPPPoE

单选题You need to recommend a solution for configuring the Automatic Updates settings on the VMs.   What should you include in the recommendation?()Ablock inheritanceBloopback processingCsecurity filteringDWMI filtering

单选题You are configuring a wireless LAN controller for QoS. Which 802.11e user priority tag should you apply to voice applications?()A1B3C4D6

单选题Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()AYou should consider configuring the sender reputation.BYou should consider configuring the sender filtering.CYou should consider configuring the content filtering.DYou should consider configuring the recipient filtering.

单选题You are configuring your index to be stored in a tablespace. Which of the following storage parameters are NOT appropriate for indexes?()AOPTIMAL BINITIAL CPCTINCREASE DNEXT