多项选择题
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
A. access profile
B. client group
C. client
D. default profile
E. external
相关考题
-
多项选择题
Which three methods of source NAT does the Junos OS support?() (Choose three.)
A. interface-based source NAT
B. source NAT with address shifting
C. source NAT using static source pool
D. interface-based source NAT without PAT
E. source NAT with address shifting and PAT -
单项选择题
Under which Junos hierarchy level are security policies configured?()
A. [edit security]
B. [edit protocols]
C. [edit firewall]
D. [edit policy-options] -
单项选择题
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
A. It enables an attacker to perform an IP sweep of devices.
B. It enables a hacker to know which operating system the system is running.
C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
D. It creates a ping of death and can cause the entire network to be infected with a virus.
