itgle.com
参考答案和解析
正确答案: C,B
解析: 暂无解析
更多“多选题Which three functions are provided by the Junos OS for security platforms?()(Choose three.)AVPN establishmentBstateful ARP lookupsCDynamic ARP inspectionDNetwork Address TranslationEinspection of packets at higher levels (Layer 4 and above)”相关问题
  • 第1题:

    Which statement is true regarding proxy ARP?()

    • A、Proxy ARP is enabled by default on stand-alone JUNOS security devices.
    • B、Proxy ARP is enabled by default on chassis clusters.
    • C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.
    • D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

    正确答案:D

  • 第2题:

    Which statement is true regarding the Junos OS?()

    • A、All platforms running the Junos OS separate the functions of learning and flooding.
    • B、All platforms running the Junos OS separate the functions of control and forwarding.
    • C、All platforms running the Junos OS separate the functions of routing and bridging.
    • D、All platforms running the Junos OS separate the functions of management and routing.

    正确答案:B

  • 第3题:

    Which statement is true regarding the Junos OS?()

    • A、All platforms running the Junos OS use the same source code base
    • B、All platforms running the Junos OS use the same PFE
    • C、All platforms running the Junos OS use a hard drive to optimize syslog data storage
    • D、All platforms running the Junos OS use a separate process with protected memory space for each routing protocol

    正确答案:A

  • 第4题:

    Which three statements are true when working with high-availability clusters? (Choose three.)()

    • A、The valid cluster-id range is between 0 and 255.
    • B、Junos OS security devices can belong to more than one cluster if cluster virtualization is enabled.
    • C、If the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.
    • D、A reboot is required if the cluster-id or node value is changed.
    • E、Junos OS security devices can belong to one cluster only.

    正确答案:C,D,E

  • 第5题:

    Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)

    • A、NAT
    • B、OSPF
    • C、SNMP
    • D、SCREEN options

    正确答案:A,D

  • 第6题:

    Which two statements are true regarding proxy ARP?()

    • A、Proxy ARP is enabled by default.
    • B、Proxy ARP is not enabled by default.
    • C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.
    • D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

    正确答案:B,D

  • 第7题:

    多选题
    Which three functions are provided by JUNOS Software for security platforms?()
    A

    VPN establishment

    B

    stateful ARP lookups

    C

    Dynamic ARP inspection

    D

    Network Address Translation

    E

    inspection of packets at higher levels (Layer 4 and above)


    正确答案: E,C
    解析: 暂无解析

  • 第8题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: A,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which three statements are true about DAI?()
    A

    DAI intercept all ARP packets on untrusted ports

    B

    DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.

    C

    DAI is used to prevent against a DHCP Snooping attack.

    D

    DAI forwards all ARP packets received on a trusted interface without any checks.

    E

    DAI forwards all ARP packets on untrusted ports.

    F

    DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.


    正确答案: F,E
    解析: 暂无解析

  • 第10题:

    多选题
    Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)
    A

    NAT

    B

    OSPF

    C

    SNMP

    D

    SCREEN options


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which three methods of source NAT does the Junos OS support?() (Choose three.)
    A

    interface-based source NAT

    B

    source NAT with address shifting

    C

    source NAT using static source pool

    D

    interface-based source NAT without PAT

    E

    source NAT with address shifting and PAT


    正确答案: E,D
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement is true regarding proxy ARP?()
    A

    Proxy ARP is enabled by default on stand-alone JUNOS security devices.

    B

    Proxy ARP is enabled by default on chassis clusters.

    C

    JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.

    D

    JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which three methods of source NAT does the Junos OS support?() (Choose three.)

    • A、interface-based source NAT
    • B、source NAT with address shifting
    • C、source NAT using static source pool
    • D、interface-based source NAT without PAT
    • E、source NAT with address shifting and PAT

    正确答案:A,B,C

  • 第14题:

    Which three options represent IDP policy match conditions? ()(Choose three.)

    • A、service
    • B、to-zone
    • C、attacks
    • D、port
    • E、destination-address

    正确答案:B,C,E

  • 第15题:

    Which three statements are true about DAI?()

    • A、DAI intercept all ARP packets on untrusted ports
    • B、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.
    • C、DAI is used to prevent against a DHCP Snooping attack.
    • D、DAI forwards all ARP packets received on a trusted interface without any checks.
    • E、DAI forwards all ARP packets on untrusted ports.
    • F、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

    正确答案:A,B,D

  • 第16题:

    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

    • A、zone objects
    • B、policy objects
    • C、attack objects
    • D、alert and notify objects
    • E、network and address objects

    正确答案:A,C,E

  • 第17题:

    Which statement is true regarding the Junos OS?()

    • A、All platforms running the Junos OS have identical factory-default configurations
    • B、All platforms running the Junos OS use the IP2 processor for longest-match lookup
    • C、All platforms running the Junos OS use the same source code base
    • D、All platforms running the Junos OS use FXP1 for communication between control and forwarding planes

    正确答案:C

  • 第18题:

    Which three functions are provided by the Junos OS for security platforms?()(Choose three.)

    • A、VPN establishment
    • B、stateful ARP lookups
    • C、Dynamic ARP inspection
    • D、Network Address Translation
    • E、inspection of packets at higher levels (Layer 4 and above)

    正确答案:A,D,E

  • 第19题:

    多选题
    Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN (Choose three.)()。
    A

    HDLC

    B

    Ethernet

    C

    Token Ring

    D

    PPP

    E

    FDDI

    F

    Frame Relay


    正确答案: E,A
    解析: 暂无解析

  • 第20题:

    多选题
    Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
    A

    VPN establishment

    B

    stateful ARP lookups

    C

    Dynamic ARP inspection

    D

    Network Address Translation

    E

    inspection of packets at higher levels (Layer 4 and above)


    正确答案: C,E
    解析: 暂无解析

  • 第21题:

    多选题
    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
    A

    zone objects

    B

    policy objects

    C

    attack objects

    D

    alert and notify objects

    E

    network and address objects


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which three options represent IDP policy match conditions? ()(Choose three.)
    A

    service

    B

    to-zone

    C

    attacks

    D

    port

    E

    destination-address


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which three statements are true when working with high-availability clusters? (Choose three.)()
    A

    The valid cluster-id range is between 0 and 255.

    B

    Junos OS security devices can belong to more than one cluster if cluster virtualization is enabled.

    C

    If the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.

    D

    A reboot is required if the cluster-id or node value is changed.

    E

    Junos OS security devices can belong to one cluster only.


    正确答案: E,B
    解析: 暂无解析

  • 第24题:

    多选题
    Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()
    A

    Router A is responsible for answering ARP requests sent to the virtual IP address.

    B

    If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A

    C

    If another router were added to this GLBP group, there would be two backup AVGs

    D

    Router B is in GLBP listen state.

    E

    Router A alternately responds to ARP requests with different virtual MAC addresses.

    F

    Router B will transition from blocking state to forwarding state when it becomes the AVG


    正确答案: A,F
    解析: 暂无解析