It enables traffic counting and logging.
It enforces a set of rules for transit traffic.
It controls host inbound services on a zone.
It controls administrator rights to access the device.
第1题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第2题:
A datacenter director implements a new security measure in response to multiple equipment thefts from the datacenter. The new security measure requires people entering or leaving the data center to go through an extra secure area. Once entering the area people must present two forms of authentication to leave. Which of the following security measures does this describe?()
第3题:
A. clean separation of security and routing policies
B. clean separation of control and forwarding planes
C. modularization of multiple software processes
D. a single hardware platform for all software applications
第4题:
Which two of these statements best describe the benefits of WPAv1? ()
第5题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第6题:
Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
第7题:
Which two design goals describe the Junos OS design?()
第8题:
A.It specifies use of a static encryption key that must be changed frequently to enhance security
B.It requires use of an open authentication method
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D.It requires that all access points and wireless devices use the same encryption key
E.It includes authentication by PSK
第9题:
Which two statements accurately describe an IBGP peering session?() (Choose two.)
第10题:
Which two statements describe the advantages to the use of RIP over the use of OSPF?()