A. 30 seconds B. 1 minute C. 5 minutes D. 30 minutes
多项选择题A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)
A. Use the custom application feature. B. Configure static NAT for the host. C. Use port address translation (PAT). D. Use the address-persistent option.
单项选择题A user wants to establish an FTP session to a server behind an SRX device but must authenticate to a Web page on the SRX device for additional authentication.Which type of user authentication is configured?()
A. pass-through B. WebAuth C. WebAuth with Web redirect D. pass-through with Web redirect
单项选择题Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()
A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } } B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } } C. [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } } D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }
多项选择题Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
A. A client group is a list of clients associated with a group. B. A client group is a list of groups associated with a client. C. Client groups are referenced in security policy in the same manner in which individual clients are referenced. D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
单项选择题How many IDP policies can be active at one time on an SRX Series device by means of the set security idp active-policy configuration statemen?()
A.1 B.2 C.4 D.8