single layer of firewalling
multiple layers of firewalling
firewall connections in either an active or standby state
an architecture in which all traffic between firewalls goes through application-specific servers
第1题:
A.sessions
B.sa-validate
C.split-horizon
D.duplicate-protection
第2题:
You have been asked to configure a login class which will permit its users to view and edit the configuration. The class should only allow the configuration of the interfaces and firewall heirarchies. Which configuration correctly accomplishes this?()
A.A
B.B
C.C
D.D
第3题:
It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()
第4题:
请问您是哪位?用英语最妥当的表述是()。
第5题:
How do objects pass messages in Java?()
第6题:
Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }
第7题:
What is the function of Host Checker?()
第8题:
A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.
An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.
Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.
Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.
The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.
The SDM provides a basic, intermediate, and advanced firewall wizard.
第9题:
aaa configuration commands and the SDM Basic Firewall wizard
setup exec command and the SDM Security Audit wizard
auto secure exec command and the SDM One-Step Lockdown wizard
Cisco Common Classification Policy Language configuration commands and the SDM Site-to- Site VPN
第10题:
They pass messages by modifying each other’s member variables
They pass messages by modifying the static member variables of each other’s classes
They pass messages by calling each other’s instance member methods
They pass messages by calling static member methods of each other’s classes.
第11题:
CLI
WebUI
NSM
Junos Pulse Access Control Service
第12题:
[edit access]
[edit security access]
[edit firewall access]
[edit firewall-authentication]
第13题:
A. sessions
B. sa-validate
C. split-horizon
D. duplicate-protection
第14题:
“Calling once,calling twice,last calling”(翻译)()。
第15题:
Which configuration command limits the number of connections supported on a single PPPoE major interface?()
第16题:
You work as a network engineer for the company, you want to configure two BGP speakers to form an EBGP session across a firewall. On the engineer’s network, the firewall always permits TCP sessions that are initiated from the inside network (the network attached to the inside interface of the firewall). What prerequisite is there for enabling BGP to run on this network?()
第17题:
Under which configuration hierarchy is an access profile configured for firewall user authentication?()
第18题:
Which configuration command prevents a client from establishing multiple PPPoE connections from a single workstation?()
第19题:
ftp-group
ftp-users
firewall-user
nancy and walter
第20题:
when the router is booted up
when the router administratively does a no shutdown on the IPSec SA
when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up
when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately
第21题:
single layer of firewalling
multiple layers of firewalling
firewall connections in either an active or standby state
an architecture in which all traffic between firewalls goes through application-specific servers
第22题:
normal
different
necessary
important
第23题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第24题: