A. symmetric key encryption B. asymmetric key encryption C. RSA D. digital certificates
单项选择题Which command shows the event and traceoptions file for chassis clusters?()
A. show log chassisd B. show log clusterd C. show log jsrpd D. show log messages
多项选择题Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)
A. routing-instance B. zone C. interface D. policy E. rule-set
单项选择题You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?()
A. [edit security screen] user@host# show ids-option untrust-screen { alarm-test-only; } B. [edit security screen] user@host# show ids-option untrust-screen { alarm-without-drop; } C. [edit security screen] user@host# show ids-option untrust-screen { alarm-no-drop; } D. [edit security screen] user@host# show ids-option untrust-screen { test-without-drop; }
多项选择题What are three different integrated UTM components available on the branch SRX Series devices?() (Choose three.)
A. antivirus (full AV, express AV) B. antivirus (desktop AV) C. Web filtering D. antispam E. firewall user authentication
多项选择题Which three actions can a branch SRX Series device perform on a spam e-mail message?() (Choose three.)
A. It can drop the connection at the IP address level B. It can block the e-mail based upon the sender ID C. It can allow the e-mail and bypass all UTM inspection D. It can allow the e-mail to be forwarded, but change the intended recipient to a new e-mail address E. It can allow the e-mail to be forwarded to the destination, but tag it with a custom value in the subject line