多选题Which three functions are provided by JUNOS Software for security platforms?()AVPN establishmentBstateful ARP lookupsCDynamic ARP inspectionDNetwork Address TranslationEinspection of packets at higher levels (Layer 4 and above)

题目
多选题
Which three functions are provided by JUNOS Software for security platforms?()
A

VPN establishment

B

stateful ARP lookups

C

Dynamic ARP inspection

D

Network Address Translation

E

inspection of packets at higher levels (Layer 4 and above)

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The user of Host1 wants to ping the DSL modem/router at 192.168.1.254. Based on the Host1 ARP table that is shown in the exhibit, what will Host1 do()。

A.send a unicast ARP packet to the DSL modem/router

B.send unicast ICMP packets to the DSL modem/router

C.send Layer 3 broadcast packets to which the DSL modem/router responds

D.send a Layer 2 broadcast that is received by Host2, the switch, and the DSL modem/router


参考答案:B

第2题:

Which statement is true regarding proxy ARP?()

  • A、Proxy ARP is enabled by default on stand-alone JUNOS security devices.
  • B、Proxy ARP is enabled by default on chassis clusters.
  • C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.
  • D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

正确答案:D

第3题:

Which three functions are provided by the Junos OS for security platforms?()(Choose three.)

A. VPN establishment

B. stateful ARP lookups

C. Dynamic ARP inspection

D. Network Address Translation

E. inspection of packets at higher levels (Layer 4 and above)


参考答案:A, D, E

第4题:

You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()

  • A、 Enable root guard to mitigate ARP address spoofing attacks.
  • B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.
  • C、 Configure PVLANs to mitigate MAC address flooding attacks.
  • D、 Enable root guard to mitigate DHCP spoofing attacks.
  • E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.
  • F、 Configure port security to mitigate MAC address flooding  
  • G、 None of the other alternatives apply

正确答案:F

第5题:

Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()

  • A、JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.
  • B、JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.
  • C、JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.
  • D、JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

正确答案:B,C

第6题:

Which three functions are provided by JUNOS Software for security platforms?()

  • A、VPN establishment
  • B、stateful ARP lookups
  • C、Dynamic ARP inspection
  • D、Network Address Translation
  • E、inspection of packets at higher levels (Layer 4 and above)

正确答案:A,D,E

第7题:

Which statement is true regarding the Junos OS?()

  • A、All platforms running the Junos OS separate the functions of learning and flooding.
  • B、All platforms running the Junos OS separate the functions of control and forwarding.
  • C、All platforms running the Junos OS separate the functions of routing and bridging.
  • D、All platforms running the Junos OS separate the functions of management and routing.

正确答案:B

第8题:

What are three functions associated with JUNOS software class of service?()

A. Log incoming traffic.

B. Classify incoming packets.

C. Manage outbound bandwidth.

D. Manage congestion by intelligently dropping traffic.

E. Classify ATM QoS packets into an equivalent IP CoS environment.


参考答案:B, C, D

第9题:

Which three statements are true regarding IDP?()

  • A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
  • B、IDP inspects traffic up to the Application layer.
  • C、IDP searches the data stream for specific attack patterns.
  • D、IDP inspects traffic up to the Presentation layer.
  • E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

正确答案:B,C,E

第10题:

The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()

  • A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
  • B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.
  • C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
  • D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.
  • E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

正确答案:B,C

更多相关问题