United Threat Monitor
Universal Threat Manager
Unified Threat Management
Ultimate Threat Monitoring
第1题:
A. show security utm content-filtering statistics
B. show security flow session
C. show security flow statistics
D. show security utm content-filtering summary
第2题:
A. an antispam license
B. DNS servers configured on the SRX Series device
C. SMTP services on SRX
D. a UTM profile with an antispam configuration in the appropriate security policy
E. antivirus (full or express)
第3题:
●Transport gateways connect byte streams in the transport layer.Application gateways allow interworking above (72) .
(72) A.network layer
B.data link layer
C.transport layer
D.appfication layer
第4题:
统一威胁管理系统(UTM)描述正确的是()。
第5题:
A. UTM profiles are applied on a security policy by policy basis.
B. UTM profiles are applied at the global policy level.
C. Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.
D. Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.
第6题:
A. Install the license key and all UTM features will be enabled for the life of the product
B. Install one license key per feature and the license key will be enabled for the life of the product.
C. Install one UTM license key, which will activate all UTM features; the license will need to be renewed when it expires.
D. Install one UTM license key per UTM feature; the licenses will need to be renewed when they expire.
第7题:
A. set content-filtering profile
B. set content-filtering profile
C. set content-filtering block-content-type
D. set content-filtering notifications block-mime
第8题:
Transport gateways connect byte streams in the transport layer. Application gateways allow interworking above
A.network layer
B.data link layer
C.transport layer
D.application layer
第9题:
A. show security utm anti-virus status
B. show security anti-virus database status
C. show security utm anti-virus database
D. show security utm anti-virus update
第10题:
Which method is of gaining access to a system that bypasses normal security measures?()