black

JN0-314

登录

单项选择题

You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()

A. resource access policies
B. Host Enforcer policies
C. source IP enforcement policies
D. IPsec enforcement policies

相关考题

单项选择题 You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()

单项选择题 Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when performing Layer 2 enforcement?()

单项选择题 You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()

All Rights Reserved 版权所有©建筑考试题库(jzkao.com)

备案号:湘ICP备2020024380号-3