KillTest 质量更高 服务更好 学习资料 半年免费更新服务

Similar documents
KillTest 质量更高 服务更好 学习资料 半年免费更新服务

一.NETGEAR VPN防火墙产品介绍

KillTest 质量更高 服务更好 学习资料 半年免费更新服务

財金資訊-80期.indd

R3105+ ADSL

IP505SM_manual_cn.doc

ebook140-8

Microsoft Word - Final Exam Review Packet.docx


KillTest 质量更高 服务更好 学习资料 半年免费更新服务

自由軟體教學平台

Microsoft PowerPoint - Aqua-Sim.pptx

ebook140-9

自由軟體教學平台

Microsoft Word - template.doc

NSC-161

ch08.PDF

计算机网络概论

RAQMON Context Setting MG PDA Applications RTP / FTP/ HTTP TCP/UDP S ignaling control plane (e.g. RS VP, NS IS) Streaming Media, Transaction, Bulk dat

A API Application Programming Interface 见 应 用 程 序 编 程 接 口 ARP Address Resolution Protocol 地 址 解 析 协 议 为 IP 地 址 到 对 应 的 硬 件 地 址 之 间 提 供 动 态 映 射 阿 里 云 内

PowerPoint Presentation

1.ai

C6_ppt.PDF

Windows RTEMS 1 Danilliu MMI TCP/IP QEMU i386 QEMU ARM POWERPC i386 IPC PC104 uc/os-ii uc/os MMI TCP/IP i386 PORT Linux ecos Linux ecos ecos eco

TX-NR3030_BAS_Cs_ indd

KillTest 质量更高 服务更好 学习资料 半年免费更新服务

<4D F736F F F696E74202D20C8EDBCFEBCDCB9B9CAA6D1D0D0DEBDB2D7F92E707074>

KillTest 质量更高 服务更好 学习资料 半年免费更新服务

¶C¶L§§¬_™¨ A.PDF

SEC-220

C3_ppt.PDF

IP Access Lists IP Access Lists IP Access Lists

幻灯片 1

D E 答 案 :C 3. 工 作 站 A 配 置 的 IP 地 址 为 /28. 工 作 站 B 配 置 的 IP 地 址 为 /28. 两 个 工 作 站 之 间 有 直 通 线 连 接, 两 台

1

Master Thesis_專門用來製作目錄.doc

高中英文科教師甄試心得

ebook140-11

Symantec™ Sygate Enterprise Protection 防护代理安装使用指南

OSI OSI 15% 20% OSI OSI ISO International Standard Organization 1984 OSI Open-data System Interface Reference Model OSI OSI OSI OSI ISO Prototype Prot

TCP/IP TCP/IP OSI IP TCP IP IP TCP/IP TCP/IP

Windows XP

穨control.PDF

自由軟體教學平台

AL-M200 Series

飞鱼星多WAN防火墙路由器用户手册

ARP ICMP

IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I

Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx

<4D F736F F F696E74202D FC2B2B3F85FA44AAB49B0BBB4FABB50B977A8BEA874B2CEC2B2A4B6BB50C0B3A5CE2E707074>

Olav Lundström MicroSCADA Pro Marketing & Sales 2005 ABB - 1-1MRS755673

untitled

BYOD Http Redirect convergence Client (1) 2008R2 NLB( ) (2) NLB Unicast mode switch flooding (arp ) NLB DNS Redirect 1. Round-Robin DNS DNS IP/DNS Cli

Microsoft PowerPoint - STU_EC_Ch08.ppt

BC04 Module_antenna__ doc

東莞工商總會劉百樂中學

UDP 8.2 TCP/IP OSI OSI 3 OSI TCP/IP IP TCP/IP TCP/IP Transport Control Protocol TCP User Datagram Protocol UDP TCP TCP/IP IP TCP TCP/IP TC

2-7.FIT)

IC-900W Wireless Pan & Tilt Wireless Pan & Tilt Remote Control / Night Vision FCC ID:RUJ-LR802UWG

Microsoft PowerPoint - ARC110_栾跃.ppt

Simulator By SunLingxi 2003

2 Edmonton 爱 德 蒙 顿 爱 德 蒙 顿 是 加 拿 大 的 节 日 之 城, 一 年 有 超 过 30 多 个 节 日 城 市 总 人 口 1000 多 万 干 净, 安 全 的 居 住 环 境 友 好 的, 充 满 活 力 的 文 化 社 区 附 近 有 许 多 风 景 优 美 的

Value Chain ~ (E-Business RD / Pre-Sales / Consultant) APS, Advanc

Fun Time (1) What happens in memory? 1 i n t i ; 2 s h o r t j ; 3 double k ; 4 char c = a ; 5 i = 3; j = 2; 6 k = i j ; H.-T. Lin (NTU CSIE) Referenc

中 國 語 文 卷 一 : 閱 讀 能 力 考 核 考 試 範 圍 : 新 高 中 中 國 語 文 新 編 第 三 冊 單 元 九 十 十 一 ; 第 四 冊 單 元 十 二 小 說 與 文 化 ( 選 修 單 元 ): 英 雄 與 俠 義 考 試 模 式 : ( 全 答 )( 佔 全 科 30%)

SL2511 SR Plus 操作手冊_單面.doc

Microsoft Word - ChineseSATII .doc

(UTM???U_935_938_955_958_959 V )

PCPDbooklet_high-res.pdf

VASP应用运行优化

Microsoft Word - (web)_F.1_Notes_&_Application_Form(Chi)(non-SPCCPS)_16-17.doc

EPSON


2010 Japanese First Language Written examination

Microsoft Word - TIP006SCH Uni-edit Writing Tip - Presentperfecttenseandpasttenseinyourintroduction readytopublish

高雄市左營國民小學八十九學年度第一學期一年級總體課程教學進度表

LAMP system and relative tools like SNMP, Expect, Nmap, etc. to build a cross- platform, lo

K301Q-D VRT中英文说明书141009

<4D F736F F D20D6D02D30312D CFC2C8EDBCFEC9E8BCC6CAA6C9CFCEE7CCE2>

第六章

Microsoft PowerPoint - 数据通信-ch1.ppt


2015 Chinese FL Written examination

9 Internet 10 Internet

中国计算机软件专业技术资格和水平考试

V6800/V6600 3D

ch_code_infoaccess

2009 Japanese First Language Written examination

國立中山大學學位論文典藏.PDF

Knowledge and its Place in Nature by Hilary Kornblith

SERVERIRON ADX

2015年4月11日雅思阅读预测机经(新东方版)

Preface This guide is intended to standardize the use of the WeChat brand and ensure the brand's integrity and consistency. The guide applies to all d

2009 Korean First Language Written examination

Microsoft Word _4.doc

<4D F736F F D205F FB942A5CEA668B443C5E9BB73A740B5D8A4E5B8C9A552B1D0A7F75FA6BFB1A4ACFC2E646F63>

untitled

TCP/IP LAN : : IPv4 NGI, NGN, GENI, AGN, Veno II 2

课题调查对象:

第3章 计算机网络体系结构

Transcription:

KillTest 质量更高 服务更好 学习资料 http://www.killtest.cn 半年免费更新服务

Exam : JN0-331 Title : SEC,Specialist(JNCIS-SEC) Version : Demo 1 / 10

1. Regarding zone types, which statement is true? A. You cannot assign an interface to a functional zone. B. You can specifiy a functional zone in a security policy. C. Security zones must have a scheduler applied. D. You can use a security zone for traffic destined for the device itself. Answer: D 2. Regarding attacks, which statement is correct? A. Both DoS and propagation attacks exploit and take control of all unprotected network devices. B. Propagation attacks focus on suspicious packet formation using the DoS SYN-ACK-ACK proxy flood. C. DoS attacks are directed at the network protection devices, while propagation attacks are directed at the servers. D. DoS attacks are exploits in nature, while propagation attacks use trust relationships to take control of the devices. Answer: D 3. Click the Exhibit button. [edit schedulers] scheduler now { monday all-day; tuesday exclude; wednesday { start-time 07:00:00 stop-time 18:00:00; thursday { start-time 07:00:00 stop-time 18:00:00; [edit security policies from-zone Private to-zone External] 2 / 10

policy allowtransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; then { permit { tunnel { ipsec-vpn mytunnel; scheduler-name now; Based on the configuration shown in the exhibit, what are the actions of the security policy? A. The policy will always permit transit packets and use the IPsec VPN mytunnel. B. The policy will permit transit packets only on Monday, and use the IPsec VPN Mytunnel. C. The policy will permit transit packets and use the IPsec VPN mytunnel all day Monday and Wednesday 7am to 6pm, and Thursday 7am to 6pm. D. The policy will always permit transit packets, but will only use the IPsec VPN mytunnel all day Monday and Wednesday 7am to 6pm, and Thursday 7am to 6pm. Answer: C 4. Which two statements are true regarding proxy ARP? (Choose two.) A. Proxy ARP is enabled by default. B. Proxy ARP is not enabled by default. C. JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled. D. JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled. 3 / 10

Answer: BD 5. For IKE phase 1 negotiations, when is aggressive mode typically used? A. when one of the tunnel peers has a dynamic IP address B. when one of the tunnel peers wants to force main mode to be used C. when fragmentation of the IKE packet is required between the two peers D. when one of the tunnel peers wants to specify a different phase 1 proposal Answer: A 6. Click the Exhibit button. [edit groups] node0 { system { host-name NODE0; fxp0 { unit 0 { family inet { address 1.1.1.1/24; node1 { system { host-name NODE1; 4 / 10

fxp0 { unit 0 { family inet { address 1.1.1.2/24; In the exhibit, what is the function of the configuration statements? A. This section is where you define all chassis clustering configuration. B. This configuration is required for members of a chassis cluster to talk to each other. C. You can apply this configuration in the chassis cluster to make configuration easier. D. This section is where unique node configuration is applied. Answer: D 7. Which two statements describe the difference between JUNOS Software for security platforms and a traditional router? (Choose two.) A. JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT. B. JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default. C. JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding. D. JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet. Answer: BC 8. Which two statements describe the difference between JUNOS Software for security platforms and a 5 / 10

traditional router? (Choose two.) A. JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT. B. JUNOS Software for security platforms secures traffic by default; a traditional router does not secure traffic by default. C. JUNOS Software for security platforms allows for session-based forwarding; a traditional router uses packet-based forwarding. D. JUNOS Software for security platforms separates broadcast domains; a traditional router does not separate broadcast domains. Answer: BC 9. A traditional router is better suited than a firewall device for which function? A. VPN establishment B. packet-based forwarding C. stateful packet processing D. Network Address Translation Answer: B 10. Which three functions are provided by JUNOS Software for security platforms? (Choose three.) A. VPN establishment B. stateful ARP lookups C. Dynamic ARP inspection D. Network Address Translation E. inspection of packets at higher levels (Layer 4 and above) Answer: ADE 11. What are two components of the JUNOS Software architecture? (Choose two.) A. Linux kernel B. routing protocol daemon C. session-based forwarding module 6 / 10

D. separate routing and security planes Answer: BC 12. Which two functions of JUNOS Software are handled by the data plane? (Choose two.) A. NAT B. OSPF C. SNMP D. SCREEN options Answer: AD 13. Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many flows exist between Host A and Host B? A. 1 B. 2 C. 3 D. 4 Answer: D 14. Which two statements about JUNOS Software packet handling are correct? (Choose two.) A. JUNOS Software applies service ALGs only for the first packet of a flow. B. JUNOS Software uses fast-path processing only for the first packet of a flow. C. JUNOS Software performs route and policy lookup only for the first packet of a flow. D. JUNOS Software applies SCREEN options for both first and consecutive packets of a flow. Answer: CD 15. In JUNOS Software, which three packet elements can be inspected to determine if a session already exists? (Choose three.) A. IP protocol 7 / 10

B. IP time-to-live C. source and destination IP address D. source and destination MAC address E. source and destination TCP/UDP port Answer: ACE 16. By default, which condition would cause a session to be removed from the session table? A. Route entry for the session changed. B. Security policy for the session changed. C. The ARP table entry for the source IP address timed out. D. No traffic matched the session during the timeout period. Answer: D 17. What is the default session timeout for UDP sessions? A. 30 seconds B. 1 minute C. 5 minutes D. 30 minutes Answer: C 18. What is the purpose of a zone in JUNOS Software? A. A zone defines a group of security devices with a common management. B. A zone defines the geographic region in which the security device is deployed. C. A zone defines a group of network segments with similar security requirements. D. A zone defines a group of network segments with similar class-of-service requirements. Answer: C 19. Users can define policy to control traffic flow between which two components? (Choose two.) A. from a zone to the device itself B. from a zone to the same zone 8 / 10

C. from a zone to a different zone D. from one interface to another interface Answer: BC 20. Which two configurations are valid? (Choose two.) A. [edit security zones] security-zone red { ge-0/0/1.0; ge-0/0/3.0; security-zone blue { ge-0/0/2.0; ge-0/0/3.102; B. [edit security zones] security-zone red { ge-0/0/1.0; ge-0/0/2.0; security-zone blue { ge-0/0/1.0; 9 / 10

ge-0/0/3.0; C. [edit routing-instances] red { interface ge-0/0/3.0; interface ge-0/0/2.102; blue { interface ge-0/0/0.0; interface ge-0/0/3.0; D. [edit routing-instances] red { interface ge-0/0/3.0; interface ge-0/0/3.102; blue { interface ge-0/0/0.0; interface ge-0/0/2.0; Answer: AD 10 / 10