VPN establishment
stateful ARP lookups
Dynamic ARP inspection
Network Address Translation
inspection of packets at higher levels (Layer 4 and above)
第1题:
Which statement is true regarding proxy ARP?()
第2题:
Which statement is true regarding the Junos OS?()
第3题:
Which statement is true regarding the Junos OS?()
第4题:
Which three statements are true when working with high-availability clusters? (Choose three.)()
第5题:
Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)
第6题:
Which two statements are true regarding proxy ARP?()
第7题:
VPN establishment
stateful ARP lookups
Dynamic ARP inspection
Network Address Translation
inspection of packets at higher levels (Layer 4 and above)
第8题:
access profile
client group
client
default profile
external
第9题:
DAI intercept all ARP packets on untrusted ports
DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.
DAI is used to prevent against a DHCP Snooping attack.
DAI forwards all ARP packets received on a trusted interface without any checks.
DAI forwards all ARP packets on untrusted ports.
DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
第10题:
NAT
OSPF
SNMP
SCREEN options
第11题:
interface-based source NAT
source NAT with address shifting
source NAT using static source pool
interface-based source NAT without PAT
source NAT with address shifting and PAT
第12题:
Proxy ARP is enabled by default on stand-alone JUNOS security devices.
Proxy ARP is enabled by default on chassis clusters.
JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.
JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled
第13题:
Which three methods of source NAT does the Junos OS support?() (Choose three.)
第14题:
Which three options represent IDP policy match conditions? ()(Choose three.)
第15题:
Which three statements are true about DAI?()
第16题:
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
第17题:
Which statement is true regarding the Junos OS?()
第18题:
Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
第19题:
HDLC
Ethernet
Token Ring
PPP
FDDI
Frame Relay
第20题:
VPN establishment
stateful ARP lookups
Dynamic ARP inspection
Network Address Translation
inspection of packets at higher levels (Layer 4 and above)
第21题:
zone objects
policy objects
attack objects
alert and notify objects
network and address objects
第22题:
service
to-zone
attacks
port
destination-address
第23题:
The valid cluster-id range is between 0 and 255.
Junos OS security devices can belong to more than one cluster if cluster virtualization is enabled.
If the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.
A reboot is required if the cluster-id or node value is changed.
Junos OS security devices can belong to one cluster only.
第24题:
Router A is responsible for answering ARP requests sent to the virtual IP address.
If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A
If another router were added to this GLBP group, there would be two backup AVGs
Router B is in GLBP listen state.
Router A alternately responds to ARP requests with different virtual MAC addresses.
Router B will transition from blocking state to forwarding state when it becomes the AVG