A.[edit access] B.[edit security access] C.[edit firewall access] D.[edit firewall-authentication]
单项选择题Whichstatementaccuratelydescribesfirewalluserauthentication?()
A.Firewall user authentication provides another layer of security in a network. B.Firewall user authentication provides a means for accessing a JUNOS Software-based security device. C.Firewall user authentication enables session-based forwarding. D.Firewall user authentication is used as a last resort security method in a network.
多项选择题Whichtwostatementsaretrueregardingfirewalluserauthentication?()
A.When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource. B.When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource. C.If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication. D.If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
多项选择题Whichtwotraffictypestriggerpass-throughfirewalluserauthentication?()
A.SSH B.Telnet C.ICMP D.OSPF E.HTTP
单项选择题WhichstatementregardingtheimplementationofanIDPpolicytemplateistrue?()
A.IDP policy templates are automatically installed as the active IDP policy. B.IDP policy templates are enabled using a commit script. C.IDP policy templates can be downloaded without an IDP license. D.IDP policy templates are included in the factory-default configuration.
多项选择题YouareimplementinganIDPpolicytemplatefromJuniperNetworks.Whichthreestepsareincludedinthisprocess?()
A.activating a JUNOS Software commit script B.configuring an IDP groups statement C.setting up a chassis cluster D.downloading the IDP policy templates E.installing the policy templates