Juniper Security

Juniper Security

1st - 2nd Grade

65 Qs

quiz-placeholder

Similar activities

Exchange Quiz

Exchange Quiz

KG - University

70 Qs

Microsoft Windows 10

Microsoft Windows 10

1st Grade - Professional Development

61 Qs

AWS 3

AWS 3

KG - University

63 Qs

(CLF-C02) AWS Certified Cloud Practitioner Practice Exam 2

(CLF-C02) AWS Certified Cloud Practitioner Practice Exam 2

1st Grade

65 Qs

module 16 17

module 16 17

1st - 3rd Grade

66 Qs

CISSP 7th ed PT2

CISSP 7th ed PT2

KG - University

60 Qs

ข้อสอบปลายภาค วิเคราะห์และออกแบบระบบ

ข้อสอบปลายภาค วิเคราะห์และออกแบบระบบ

1st Grade

60 Qs

Simulasi CIHE

Simulasi CIHE

1st - 5th Grade

65 Qs

Juniper Security

Juniper Security

Assessment

Quiz

Instructional Technology, Computers

1st - 2nd Grade

Easy

Created by

Resa Padila Putri

Used 3+ times

FREE Resource

65 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which statement is correct regarding the interface configuration shown in the exhibit?

The interface MTU has been increased.

The IP address has an invalid subnet mask.

The IP address is assigned to unit 0.

The interface is assigned to the trust zone by default

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

The Sky ATP premium or basic-Threat Feed license is needed for which two features? (Choose two.)

Outbound protection

C&C feeds

Executable inspection

Custom feeds

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which statement is correct about IKE?

IKE phase 1 is used to establish the data path

IKE phase 1 only support aggressive mode.

IKE phase 1 negotiates a secure channel between gateways.

IKE phase 1 establishes the tunnel between devices

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which two segments describes IPsec VPNs? (Choose two.)

IPsec VPN traffic is always authenticated.

IPsec VPN traffic is always encrypted.

IPsec VPNs use security to secure traffic over a public network between two remote sites.

IPsec VPNs are dedicated physical connections between two private networks.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Users on the network are restricted from accessing Facebook, however, a recent examination of the logs show that users are accessing Facebook.

Referring to the exhibit, Why is this problem happening?

Global rules are honored before zone-based rules.

The internet-Access rule has a higher precedence value

The internet-Access rule is listed first

Zone-based rules are honored before global rules

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

You have created a zones-based security policy that permits traffic to a specific webserver for the marketing team. Other groups in the company are not permitted to access the webserver. When marketing users attempt to access the server they are unable to do so.

What are two reasons for this access failure? (Choose two.)

You failed to change the source zone to include any source zone.

You failed to position the policy after the policy that denies access to the webserver.

You failed to commit the policy change.

You failed to position the policy before the policy that denies access the webserver

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which two match conditions would be used in both static NAT and destination NAT rule sets? (Choose two.)

Destination zone

Destination address

Source interface

Source zone

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?