A. antivirus (full AV, express AV) B. antivirus (desktop AV) C. Web filtering D. antispam E. firewall user authentication
多项选择题Which three actions can a branch SRX Series device perform on a spam e-mail message?() (Choose three.)
A. It can drop the connection at the IP address level B. It can block the e-mail based upon the sender ID C. It can allow the e-mail and bypass all UTM inspection D. It can allow the e-mail to be forwarded, but change the intended recipient to a new e-mail address E. It can allow the e-mail to be forwarded to the destination, but tag it with a custom value in the subject line
多项选择题Which two statements apply to policy scheduling?() (Choose two.)
A. An individual policy can have only one scheduler applied. B. You must manually configure system-time updates. C. Multiple policies can use the same scheduler. D. Policies that do not have schedulers are not active.
多项选择题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)
A. data integrity B. data confidentiality C. data authentication D. outer IP header confidentiality E. outer IP header authentication
多项选择题Which three options represent IDP policy match conditions? ()(Choose three.)
A.service B.to-zone C.attacks D.port E.destination-address
多项选择题Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
A. VPN establishment B. stateful ARP lookups C. Dynamic ARP inspection D. Network Address Translation E. inspection of packets at higher levels (Layer 4 and above)