Juniper Security

Juniper Security

1st - 2nd Grade

65 Qs

quiz-placeholder

Similar activities

KOd Arahan Tingkatan 2 ASK

KOd Arahan Tingkatan 2 ASK

2nd Grade

61 Qs

Computer Grand Quiz-Gr02

Computer Grand Quiz-Gr02

2nd Grade

61 Qs

Mobile Quizz

Mobile Quizz

1st Grade

70 Qs

Modules 16 – 17

Modules 16 – 17

1st - 5th Grade

62 Qs

Concurso 2021 Acad Info

Concurso 2021 Acad Info

1st - 2nd Grade

70 Qs

GRADE FOUR COMPUTER QUIIZ

GRADE FOUR COMPUTER QUIIZ

KG - 9th Grade

70 Qs

Latihan soal 1

Latihan soal 1

1st - 11th Grade

66 Qs

ôn tập thi hk 1 tin học lớp 5

ôn tập thi hk 1 tin học lớp 5

1st Grade

60 Qs

Juniper Security

Juniper Security

Assessment

Quiz

Instructional Technology, Computers

1st - 2nd Grade

Easy

Created by

Resa Padila Putri

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

65 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which statement is correct regarding the interface configuration shown in the exhibit?

The interface MTU has been increased.

The IP address has an invalid subnet mask.

The IP address is assigned to unit 0.

The interface is assigned to the trust zone by default

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

The Sky ATP premium or basic-Threat Feed license is needed for which two features? (Choose two.)

Outbound protection

C&C feeds

Executable inspection

Custom feeds

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which statement is correct about IKE?

IKE phase 1 is used to establish the data path

IKE phase 1 only support aggressive mode.

IKE phase 1 negotiates a secure channel between gateways.

IKE phase 1 establishes the tunnel between devices

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which two segments describes IPsec VPNs? (Choose two.)

IPsec VPN traffic is always authenticated.

IPsec VPN traffic is always encrypted.

IPsec VPNs use security to secure traffic over a public network between two remote sites.

IPsec VPNs are dedicated physical connections between two private networks.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Users on the network are restricted from accessing Facebook, however, a recent examination of the logs show that users are accessing Facebook.

Referring to the exhibit, Why is this problem happening?

Global rules are honored before zone-based rules.

The internet-Access rule has a higher precedence value

The internet-Access rule is listed first

Zone-based rules are honored before global rules

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

You have created a zones-based security policy that permits traffic to a specific webserver for the marketing team. Other groups in the company are not permitted to access the webserver. When marketing users attempt to access the server they are unable to do so.

What are two reasons for this access failure? (Choose two.)

You failed to change the source zone to include any source zone.

You failed to position the policy after the policy that denies access to the webserver.

You failed to commit the policy change.

You failed to position the policy before the policy that denies access the webserver

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which two match conditions would be used in both static NAT and destination NAT rule sets? (Choose two.)

Destination zone

Destination address

Source interface

Source zone

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?