[edit security]
[edit protocols]
[edit firewall]
[edit policy-options]
第1题:
_______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.
A.Security level 1
B.Security level 2
C.Security level 3
D.Security level 4
第2题:
A. [edit security]
B. [edit protocols]
C. [edit firewall]
D. [edit policy-options]
第3题:
Employee unions would most likely satisfy which level in Maslow's hierarchy of needs?
A Belonging
B Self-actualization
C Esteem
D Safety
E Empowerment
第4题:
According to JUNOS software route selection algorithm, which IS-IS route type is most preferred?()
第5题:
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
A. Session-Export policies on the Junos Pulse Secure Access Service
B. Session-Export policies on the Junos Pulse Access Control Service
C. Session-Import policies on the Junos Pulse Secure Access Service
D. Session-Import policies on the Junos Pulse Access Control Service
E. Resource access policies on the Junos Pulse Access Control Service
第6题:
A. [edit security idp]
B. [edit security zones security-zone trust interfaces ge-0/0/0.0]
C. [edit security zones security-zone trust]
D. [edit security screen]
第7题:
A. self
B. trust
C. untrust
D. junos-global
第8题:
A.Alerts
B.Multi-Org
C.Flexfields
D.Shared entities
E.Business Intelligence
第9题:
A. Policies and procedures
B. Encryption
C. Locked doors
D. Security personnel
E. Backup tapes
第10题:
After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()