A. symmetric key encryption
B. asymmetric key encryption
C. RSA
D. digital certificates
第1题:
Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()
A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }
B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }
C. [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }
D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }
第2题:
Basedontheconfigurationshownintheexhibit,whataretheactionsofthesecuritypolicy?()[editschedulers]user@hostshowschedulernow{mondayall-day;tuesdayexclude;wednesday{start-time07:00:00stop-time18:00:00;}thursday{start-time07:00:00stop-time18:00:00;}}[editsecuritypoliciesfrom-zonePrivateto-zoneExternal]user@hostshowpolicyallowTransit{match{source-addressPrivateHosts;destination-addressExtServers;applicationExtApps;}then{permit{tunnel{ipsec-vpnmyTunnel;}}}scheduler-namenow;
A.ThepolicywillalwayspermittransitpacketsandusetheIPsecVPNmyTunnel.
B.ThepolicywillpermittransitpacketsonlyonMonday,andusetheIPsecVPNMytunnel.
C.ThepolicywillpermittransitpacketsandusetheIPsecVPNmyTunnelalldayMondayandWednesday 7amto6pm,andThursday7amto6pm.
D.Thepolicywillalwayspermittransitpackets,butwillonlyusetheIPsecVPNmyTunnelalldayMonday andWednesday7amto6pm,andThursday7amto6pm.
第3题:
A.RESTOREDATAFILE’/DISK2/user_data01.dbf’
B.RESTOREDATAFILE’/DISK3/user_data01.dbf’
C.SETNEWNAMEFOR’/DISK3/user_data01.dbf’TO’/DISK2/user_data01.dbf’
D.SETNEWNAMEFOR’/DISK2/user_data01.dbf’TO’/DISK3/user_data01.dbf’
第4题:
A. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
B. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
C. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
D. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
第5题:
A.Itupdatesthecontrolfilewiththenewlocationofthedatafile.
B.Itupdatesonlythedatadictionarywiththenewlocationofthedatafile.
C.Itchangesthelocationoftheuser_data01.dbffileintheoperatingsystem.
D.Itchangesthelocationoftheuser_data01.dbffileintheoperatingsystemandupdatesthecontrolfilewiththenewlocationofthedatafile.
第6题:
A.USER_TYPE_ATTRS
B.USER_TABLES
C.USER_TYPE_TABS
D.USER_TAB_COLUMNS