A. the st interface B. the reth interface C. the fxp1 and fxp0 interfaces D. the fab0 and fab1 interfaces
多项选择题Which two packet attributes contribute to the identification of a session? ()(Choose two.)
A. destination port B. TTL C. IP options D. protocol number
单项选择题On which component is the control plane implemented?()
A. IOC B. PIM C. RE D. SPC
多项选择题Which two statements are true about AH?() (Choose two.)
A. AH provides data integrity. B. AH is identified by IP protocol 50. C. AH is identified by IP protocol 51. D. AH cannot work in conjunction with ESP
多项选择题What are three valid Juniper Networks IPS attack object types?() (Choose three.)
A. signature B. anomaly C. trojan D. virus E. chain
多项选择题Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)
A. MIME pattern B. file extension C. IP spoofing D. POP3 E. protocol command