多项选择题
A. AH provides data integrity.
B. AH is identified by IP protocol 50.
C. AH is identified by IP protocol 51.
D. AH cannot work in conjunction with ESP
多项选择题 What are three valid Juniper Networks IPS attack object types?() (Choose three.)
多项选择题 Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)
多项选择题 Antispam can be leveraged with which two features on a branch SRX Series device to provide maximum protection from malicious e-mail content? ()(Choose two.)