Firewall filters can perform which two actions?()
A. Log packets.
B. Set packet metrics.
C. Count packets.
D. Decrement packet‘s TTL value.
A. Log packets.
B. Set packet metrics.
C. Count packets.
D. Decrement packet‘s TTL value.
A.Logpacket.
B.Countpacket.
C.Setpacketmetric.
D.DecrementpacketTTL.
E.ChangedestinationIPaddress.
A.Setthenexthop.
B.Discardpackets.
C.Setthelosspriority.
D.Samplethepacketcontent.
A.Whenconfiguredforpass-throughfirewalluserauthentication,theusermustfirstopenaconnectionto theJUNOSsecurityplatformbeforeconnectingtoaremotenetworkresource.
B.WhenconfiguredforWebfirewalluserauthenticationonly,theusermustfirstopenaconnectiontothe JUNOSsecurityplatformbeforeconnectingtoaremotenetworkresource.
C.IfaJUNOSsecuritydeviceisconfiguredforpass-throughfirewalluserauthentication,newsessionsare automaticallyinterceptedtoperformauthentication.
D.IfaJUNOSsecuritydeviceisconfiguredforWebfirewalluserauthentication,newsessionsare automaticallyinterceptedtoperformauthentication.
A.Individualclientsareconfiguredunderclientgroupsintheconfigurationhierarchy.
B.Clientgroupsareconfiguredunderindividualclientsintheconfigurationhierarchy.
C.Clientgroupsarereferencedinsecuritypolicyinthesamemannerinwhichindividualclientsare referenced.
D.Clientgroupsareusedtosimplifyconfigurationbyenablingfirewalluserauthenticationwithoutsecurity policy.
A.EnableRemoteDesktopintheSystemPropertiesdialogbox.
B.EnableRemoteAssistanceintheSystemPropertiesdialogbox.
C.EnabletheRemoteDesktopexceptioninMicrosoftWindowsFirewall.
D.EnabletheRemoteAssistanceexceptioninMicrosoftWindowsFirewall.
E.EnabletheRemoteAdministrationexceptioninWindowsFirewall.
B.PIC I/O Manager ASIC
C.Distributed Buffer Manager ASIC
D.Internet Processor ASIC
A. Packets outside the 10.0.0.0/24 subnet will be accepted.
B. Packets outside the 10.0.0.0/24 subnet will be rejected.
C. Packets outside the 10.0.0.0/24 subnet will be counted.
D. Packets outside the 10.0.0.0/24 subnet will not be counted.
A. Import policies are used to filter routes from the routing table to the forwarding table.
B. Import policies are used to filter routes destined for the routing table.
C. Import policies are used to filter routes being sent to neighboring devices.
D. Import policies are used to filter traffic entering the device.
A.SSL
B.SSH
C.Telnet
D.HTTP
为了保护您的账号安全,请在“简答题”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!