单选题Which command do you use to manually remove antivirus patterns?()Arequest security utm anti-virus juniper-express-engine pattern-deleteBrequest security utm anti-virus juniper-express-engine pattern-reloadCrequest security utm anti-virus juniper-express-engine pattern-removeDdelete security utm anti-virus juniper-express-engine antivirus-pattern
单选题
Which command do you use to manually remove antivirus patterns?()
A
request security utm anti-virus juniper-express-engine pattern-delete
B
request security utm anti-virus juniper-express-engine pattern-reload
C
request security utm anti-virus juniper-express-engine pattern-remove
D
delete security utm anti-virus juniper-express-engine antivirus-pattern
参考解析
解析:
暂无解析
相关考题:
Which CLI command do you use to determine which files are cleanup candidates?() A. request system storage cleanup candidatesB. request system services storage candidatesC. request system services candidate cleanupD. request system storage cleanup dry-run
Which CLI command provides a summary of what the content-filtering engine has blocked?() A. show security utm content-filtering statisticsB. show security flow sessionC. show security flow statisticsD. show security utm content-filtering summary
Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.) A. an antispam licenseB. DNS servers configured on the SRX Series deviceC. SMTP services on SRXD. a UTM profile with an antispam configuration in the appropriate security policyE. antivirus (full or express)
Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?() A. set content-filtering profilepermit-command block-mimeB. set content-filtering profileblock-mimeC. set content-filtering block-content-typeblock-mimeD. set content-filtering notifications block-mime
Which command do you use to manually remove antivirus patterns?() A. request security utm anti-virus juniper-express-engine pattern-deleteB. request security utm anti-virus juniper-express-engine pattern-reloadC. request security utm anti-virus juniper-express-engine pattern-removeD. delete security utm anti-virus juniper-express-engine antivirus-pattern
Which command do you use to display the status of an antivirus database update?() A. show security utm anti-virus statusB. show security anti-virus database statusC. show security utm anti-virus databaseD. show security utm anti-virus update
An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?() A. Update anti-virus, security patches, BIOS software, and then the web software.B. Update the web software, security patches, anti-virus, and then the BIOS.C. Update security patches, BIOS, web software, and then the anti-virus.D. The order does not matter, only one change at a time should be done.
All-in-one UTM security gateways are starting to displace routers in many small business networks. What does UTM stand for?()A、 United Threat MonitorB、 Universal Threat ManagerC、 Unified Threat ManagementD、 Ultimate Threat Monitoring
Which command do you use to display the status of an antivirus database update?()A、show security utm anti-virus statusB、show security anti-virus database statusC、show security utm anti-virus databaseD、show security utm anti-virus update
Which CLI command provides a summary of what the content-filtering engine has blocked?()A、show security utm content-filtering statisticsB、show security flow sessionC、show security flow statisticsD、show security utm content-filtering summary
An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()A、Update anti-virus, security patches, BIOS software, and then the web software.B、Update the web software, security patches, anti-virus, and then the BIOS.C、Update security patches, BIOS, web software, and then the anti-virus.D、The order does not matter, only one change at a time should be done.
Which command do you use to manually remove antivirus patterns?()A、request security utm anti-virus juniper-express-engine pattern-deleteB、request security utm anti-virus juniper-express-engine pattern-reloadC、request security utm anti-virus juniper-express-engine pattern-removeD、delete security utm anti-virus juniper-express-engine antivirus-pattern
How do you apply UTM enforcement to security policies on the branch SRX series?()A、UTM profiles are applied on a security policy by policy basis.B、UTM profiles are applied at the global policy level.C、Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.D、Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.
Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()A、set content-filtering profile permit-command block-mimeB、set content-filtering profile block-mimeC、set content-filtering block-content-type block-mimeD、set content-filtering notifications block-mime
Which command do you issue to upgrade the current software on Junos devices?()A、request system software replaceB、request system software installC、request system software addD、request system software upgrade
Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.)A、an antispam licenseB、DNS servers configured on the SRX Series deviceC、SMTP services on SRXD、a UTM profile with an antispam configuration in the appropriate security policyE、antivirus (full or express)
Which CLI command do you use to determine which files are cleanup candidates?()A、request system storage cleanup candidatesB、request system services storage candidatesC、request system services candidate cleanupD、request system storage cleanup dry-run
You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A、set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam
Your company has an Active Directory domain. You install an Enterprise Root certification authority (CA) on a member server named Server1. You need to ensure that only the Security Manager is authorized to revoke certificates that are supplied by Server1. What should you do()A、Remove the Request Certificates permission from the Domain Users group.B、Remove the Request Certificated permission from the Authenticated Users group.C、Assign the Allow - Manage CA permission toonly the Security Manager user Account.D、Assign the Allow - Issue and Manage Certificates permission to only the Security Manger user account
单选题You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()Aset security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamBset security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamCset security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyDset security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam
单选题Your company has an Active Directory domain. You install an Enterprise Root certification authority (CA) on a member server named Server1. You need to ensure that only the Security Manager is authorized to revoke certificates that are supplied by Server1. What should you do()ARemove the Request Certificates permission from the Domain Users group.BRemove the Request Certificated permission from the Authenticated Users group.CAssign the Allow - Manage CA permission toonly the Security Manager user Account.DAssign the Allow - Issue and Manage Certificates permission to only the Security Manger user account
单选题An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()A Update anti-virus, security patches, BIOS software, and then the web software.B Update the web software, security patches, anti-virus, and then the BIOS.C Update security patches, BIOS, web software, and then the anti-virus.D The order does not matter, only one change at a time should be done.
单选题Which CLI command provides a summary of what the content-filtering engine has blocked?()Ashow security utm content-filtering statisticsBshow security flow sessionCshow security flow statisticsDshow security utm content-filtering summary
单选题Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()Aset content-filtering profile permit-command block-mimeBset content-filtering profile block-mimeCset content-filtering block-content-type block-mimeDset content-filtering notifications block-mime
单选题Which command do you use to display the status of an antivirus database update?()Ashow security utm anti-virus statusBshow security anti-virus database statusCshow security utm anti-virus databaseDshow security utm anti-virus update
单选题How do you apply UTM enforcement to security policies on the branch SRX series?()AUTM profiles are applied on a security policy by policy basis.BUTM profiles are applied at the global policy level.CIndividual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.DIndividual UTM features like anti-spam or anti-virus are applied directly at the global policy level.
单选题All-in-one UTM security gateways are starting to displace routers in many small business networks. What does UTM stand for?()A United Threat MonitorB Universal Threat ManagerC Unified Threat ManagementD Ultimate Threat Monitoring
单选题Which command do you use to manually remove antivirus patterns?()Arequest security utm anti-virus juniper-express-engine pattern-deleteBrequest security utm anti-virus juniper-express-engine pattern-reloadCrequest security utm anti-virus juniper-express-engine pattern-removeDdelete security utm anti-virus juniper-express-engine antivirus-pattern