A. destination port B. TTL C. IP options D. protocol number
单项选择题On which component is the control plane implemented?()
A. IOC B. PIM C. RE D. SPC
多项选择题Which two statements are true about AH?() (Choose two.)
A. AH provides data integrity. B. AH is identified by IP protocol 50. C. AH is identified by IP protocol 51. D. AH cannot work in conjunction with ESP
多项选择题What are three valid Juniper Networks IPS attack object types?() (Choose three.)
A. signature B. anomaly C. trojan D. virus E. chain
多项选择题Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)
A. MIME pattern B. file extension C. IP spoofing D. POP3 E. protocol command
多项选择题Antispam can be leveraged with which two features on a branch SRX Series device to provide maximum protection from malicious e-mail content? ()(Choose two.)
A. integrated Web filtering B. full AV C. IPS D. local Web filtering