You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action.Which two statements are true about traffic evaluated by this firewall filter?()
第1题:
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
A. from source-port
B. from source-address
C. from destination-address
D. from destination-port
第2题:
Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correct BGP session endpoint addresses and the correct BGP session hop-count limit (EBGP multihop). What is a good first test to see if BGP will work across the firewall?()
第3题:
You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()
A. CLI
B. WebUI
C. NSM
D. Junos Pulse Access Control Service
第4题:
You have a server that runs windows server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do?()
第5题:
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
第6题:
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
第7题:
You work as a network engineer for the company, you want to configure two BGP speakers to form an EBGP session across a firewall. On the engineer’s network, the firewall always permits TCP sessions that are initiated from the inside network (the network attached to the inside interface of the firewall). What prerequisite is there for enabling BGP to run on this network?()
第8题:
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
A. then reject
B. then discard
C. then next filter
D. then silent-drop
第9题:
You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()
第10题:
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server. Which type of connection should you configure? ()