[edit access]
[edit security access]
[edit firewall access]
[edit firewall-authentication]
第1题:
You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
A. [edit security policies from-zone HR to-zone HR]
B. [edit security zones functional-zone management protocols]
C. [edit security zones protocol-zone HR host-inbound-traffic]
D. [edit security zones security-zone HR host-inbound-traffic protocols]
第2题:
Which action change the default editor for ALL users on the system from vi to edit()
第3题:
Which two commands can be used to monitor firewall user authentication?()
第4题:
You want to allow your device to establish OSPF adjacencies with a neighboring device connected tointerface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
第5题:
Under which configuration hierarchy is an access profile configured for firewall user authentication?()
第6题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
第7题:
You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()
第8题:
[edit policy-options]
[edit routing-options]
[edit forwarding-options]
[edit protocols]
第9题:
Issue the command: export EDITOR=/usr/bin/edit edit each user .profile to change the EDITOR value to /usr/bin/edit
Modify /.profile and change the EDITOR variable to /usr/bin/edit
Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITOR
Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit
第10题:
[edit security idp]
[edit security zones security-zone trust interfaces ge-0/0/0.0]
[edit security zones security-zone trust]
[edit security screen]
第11题:
[edit access]
[edit security access]
[edit firewall access]
[edit firewall-authentication]
第12题:
[edit security screen] user@host# show ids-option untrust-screen { alarm-test-only; }
[edit security screen] user@host# show ids-option untrust-screen { alarm-without-drop; }
[edit security screen] user@host# show ids-option untrust-screen { alarm-no-drop; }
[edit security screen] user@host# show ids-option untrust-screen { test-without-drop; }
第13题:
A. [edit policy-options]
B. [edit routing-options]
C. [edit forwarding-options]
D. [edit protocols]
第14题:
Which two firewall user authentication objects can be referenced in a security policy?()
第15题:
Which statement describes the Authentication Proxy feature?()
第16题:
Which two statements regarding firewall user authentication client groups are true?()
第17题:
In which hierarchy are routing policies defined?()
第18题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第19题:
Under which Junos hierarchy level are security policies configured?()
第20题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第21题:
[edit security]
[edit protocols]
[edit firewall]
[edit policy-options]
第22题:
[edit security policies from-zone HR to-zone HR]
[edit security zones functional-zone management protocols]
[edit security zones protocol-zone HR host-inbound-traffic]
[edit security zones security-zone HR host-inbound-traffic protocols]
第23题:
All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
第24题:
Issue the command:export EDITOR=/usr/bin/edit edit each users .profile to change the EDITOR value to /usr/bin/edit
Modify /.profile and change the EDITOR variable to /usr/bin/edit
Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITOR
Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit