第1题
(75)
A.hardware
B.software
C.security
D.I/O
第2题
(75)
A.hardware
B.software
C.security
D.I/O
第3题
A. Resource access policy on the MAG Series device
B. IPsec routing policy on the MAG Series device
C. General traffic policy blocking access through the firewall enforcer
D. Auth table entry on the firewall enforcer
第4题
If you copy the online information onto your PC device, you will ______ .
A.save the time of connecting to the online system
B.reduce the risk of losing information
C.pay just local telephone charges
D.get local information only
第5题
A. Checkpoint firewall
B. SRX Series device
C. DP sensor
D. MX Series device
第6题
A. have the firewall and VPN appliance deployed in parallel
B. place the VPN in line with the firewall, with the VPN terminating inside the firewall
C. place the public side of the VPN termination device in the DMZ behind a firewall
D. place the VPN in line with the firewall, with the VPN terminating outside the firewall
第7题
A. inline with a firewall
B. in a DMZ outside the firewall
C. parallel with a firewall
D. in a DMZ behind the firewall
第8题
A firewall is a(1)system designed to(2)an organization's network against threats.
A.operating
B.programming
C.security
D.service
第9题
A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!