Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?()
第1题:
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
A. Session-Export policies on the Junos Pulse Secure Access Service
B. Session-Export policies on the Junos Pulse Access Control Service
C. Session-Import policies on the Junos Pulse Secure Access Service
D. Session-Import policies on the Junos Pulse Access Control Service
E. Resource access policies on the Junos Pulse Access Control Service
第2题:
A.IETF
B.PFC
C.ASIC
D.TCAM
第3题:
_______control system is one in which the control action is independent of the output.
A.Feed back
B.Negative feed back
C.Close loop
D.Open loop
第4题:
Which one of the following is NOT a valid RADIUS packet type?()
第5题:
A. permit access-list 101 out
B. ip access-group 101 out
C. apply access-list 101 out
D. access-class 101 out
E. ip access-list e0 out
第6题:
You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()
A. show services unified-access-control authentication-table
B. show auth table
C. show services unified-access-control policies
D. show services unified-access-control captive-portal
第7题:
A. show interface list
B. show ip route
C. show ip interface
D. show ip interface brief
E. show interface
第8题:
A. Odyssey Access Client
B. Junos Pulse
C. Java agent
D. Agent less access
第9题:
A. access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23
B. access-list 115 deny udp any 10.10.1.0 eq telnet
C. access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnet
D. access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23
E. access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23
第10题:
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()