单选题Which command do you use to manually remove antivirus patterns?()Arequest security utm anti-virus juniper-express-engine pattern-deleteBrequest security utm anti-virus juniper-express-engine pattern-reloadCrequest security utm anti-virus juniper-express-engine pattern-removeDdelete security utm anti-virus juniper-express-engine antivirus-pattern

单选题
Which command do you use to manually remove antivirus patterns?()
A

request security utm anti-virus juniper-express-engine pattern-delete

B

request security utm anti-virus juniper-express-engine pattern-reload

C

request security utm anti-virus juniper-express-engine pattern-remove

D

delete security utm anti-virus juniper-express-engine antivirus-pattern


参考解析

解析: 暂无解析

相关考题:

Which CLI command do you use to determine which files are cleanup candidates?() A. request system storage cleanup candidatesB. request system services storage candidatesC. request system services candidate cleanupD. request system storage cleanup dry-run

Which CLI command provides a summary of what the content-filtering engine has blocked?() A. show security utm content-filtering statisticsB. show security flow sessionC. show security flow statisticsD. show security utm content-filtering summary

Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.) A. an antispam licenseB. DNS servers configured on the SRX Series deviceC. SMTP services on SRXD. a UTM profile with an antispam configuration in the appropriate security policyE. antivirus (full or express)

Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?() A. set content-filtering profilepermit-command block-mimeB. set content-filtering profileblock-mimeC. set content-filtering block-content-typeblock-mimeD. set content-filtering notifications block-mime

Which command do you use to manually remove antivirus patterns?() A. request security utm anti-virus juniper-express-engine pattern-deleteB. request security utm anti-virus juniper-express-engine pattern-reloadC. request security utm anti-virus juniper-express-engine pattern-removeD. delete security utm anti-virus juniper-express-engine antivirus-pattern

Which command do you use to display the status of an antivirus database update?() A. show security utm anti-virus statusB. show security anti-virus database statusC. show security utm anti-virus databaseD. show security utm anti-virus update

An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?() A. Update anti-virus, security patches, BIOS software, and then the web software.B. Update the web software, security patches, anti-virus, and then the BIOS.C. Update security patches, BIOS, web software, and then the anti-virus.D. The order does not matter, only one change at a time should be done.

All-in-one UTM security gateways are starting to displace routers in many small business networks. What does UTM stand for?()A、 United Threat MonitorB、 Universal Threat ManagerC、 Unified Threat ManagementD、 Ultimate Threat Monitoring

Which command do you use to display the status of an antivirus database update?()A、show security utm anti-virus statusB、show security anti-virus database statusC、show security utm anti-virus databaseD、show security utm anti-virus update

Which CLI command provides a summary of what the content-filtering engine has blocked?()A、show security utm content-filtering statisticsB、show security flow sessionC、show security flow statisticsD、show security utm content-filtering summary

An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()A、Update anti-virus, security patches, BIOS software, and then the web software.B、Update the web software, security patches, anti-virus, and then the BIOS.C、Update security patches, BIOS, web software, and then the anti-virus.D、The order does not matter, only one change at a time should be done.

Which command do you use to manually remove antivirus patterns?()A、request security utm anti-virus juniper-express-engine pattern-deleteB、request security utm anti-virus juniper-express-engine pattern-reloadC、request security utm anti-virus juniper-express-engine pattern-removeD、delete security utm anti-virus juniper-express-engine antivirus-pattern

How do you apply UTM enforcement to security policies on the branch SRX series?()A、UTM profiles are applied on a security policy by policy basis.B、UTM profiles are applied at the global policy level.C、Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.D、Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.

Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()A、set content-filtering profile permit-command block-mimeB、set content-filtering profile block-mimeC、set content-filtering block-content-type block-mimeD、set content-filtering notifications block-mime

Which command do you issue to upgrade the current software on Junos devices?()A、request system software replaceB、request system software installC、request system software addD、request system software upgrade

Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.)A、an antispam licenseB、DNS servers configured on the SRX Series deviceC、SMTP services on SRXD、a UTM profile with an antispam configuration in the appropriate security policyE、antivirus (full or express)

Which CLI command do you use to determine which files are cleanup candidates?()A、request system storage cleanup candidatesB、request system services storage candidatesC、request system services candidate cleanupD、request system storage cleanup dry-run

You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A、set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

Your company has an Active Directory domain. You install an Enterprise Root certification authority (CA) on a member server named Server1. You need to ensure that only the Security Manager is authorized to revoke certificates that are supplied by Server1. What should you do()A、Remove the Request Certificates permission from the Domain Users group.B、Remove the Request Certificated permission from the Authenticated Users group.C、Assign the Allow - Manage CA permission toonly  the Security Manager user Account.D、Assign the Allow - Issue and Manage Certificates permission to only the Security Manger user account

单选题You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()Aset security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamBset security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamCset security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyDset security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

单选题Your company has an Active Directory domain. You install an Enterprise Root certification authority (CA) on a member server named Server1. You need to ensure that only the Security Manager is authorized to revoke certificates that are supplied by Server1. What should you do()ARemove the Request Certificates permission from the Domain Users group.BRemove the Request Certificated permission from the Authenticated Users group.CAssign the Allow - Manage CA permission toonly  the Security Manager user Account.DAssign the Allow - Issue and Manage Certificates permission to only the Security Manger user account

单选题An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system.  Which of the following is the BEST method to accomplish this?()A Update anti-virus, security patches, BIOS software, and then the web software.B Update the web software, security patches, anti-virus, and then the BIOS.C Update security patches, BIOS, web software, and then the anti-virus.D The order does not matter, only one change at a time should be done.

单选题Which CLI command provides a summary of what the content-filtering engine has blocked?()Ashow security utm content-filtering statisticsBshow security flow sessionCshow security flow statisticsDshow security utm content-filtering summary

单选题Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()Aset content-filtering profile permit-command block-mimeBset content-filtering profile block-mimeCset content-filtering block-content-type block-mimeDset content-filtering notifications block-mime

单选题Which command do you use to display the status of an antivirus database update?()Ashow security utm anti-virus statusBshow security anti-virus database statusCshow security utm anti-virus databaseDshow security utm anti-virus update

单选题How do you apply UTM enforcement to security policies on the branch SRX series?()AUTM profiles are applied on a security policy by policy basis.BUTM profiles are applied at the global policy level.CIndividual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.DIndividual UTM features like anti-spam or anti-virus are applied directly at the global policy level.

单选题All-in-one UTM security gateways are starting to displace routers in many small business networks. What does UTM stand for?()A United Threat MonitorB Universal Threat ManagerC Unified Threat ManagementD Ultimate Threat Monitoring

单选题Which command do you use to manually remove antivirus patterns?()Arequest security utm anti-virus juniper-express-engine pattern-deleteBrequest security utm anti-virus juniper-express-engine pattern-reloadCrequest security utm anti-virus juniper-express-engine pattern-removeDdelete security utm anti-virus juniper-express-engine antivirus-pattern