mode
IKE gateway
security proposal
Perfect Forward Secrecy
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()A. access profileB. IKE parametersC. tunneled interfaceD. redirect policy
点击查看答案
Which three parameters are configured in the IKE policy? ()(Choose three.)A. modeB. preshared keyC. external interfaceD. security proposalsE. dead peer detection settings
Which two statements are true with regard to policy ordering? ()(Choose two.)A. The last policy is the default policy, which allows all traffic.B. The order of policies is not important.C. New policies are placed at the end of the policy list.D. The insert command can be used to change the order.
Which two parameters are configured in IPsec policy? ()(Choose two.)A. modeB. IKE gatewayC. security proposalD. Perfect Forward Secrecy
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()A. Resource access policy on the MAG Series deviceB. IPsec routing policy on the MAG Series deviceC. General traffic policy blocking access through the firewall enforcerD. Auth table entry on the firewall enforcer
When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()A. IPsec RoutingB. Access ControlC. IP Address PoolD. Source Interface
Which two statements are true regarding interface properties? ()A.MTU and speed must be configured under each unit.B.Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.C.IP and IPv6 addresses are configured under a unit-number.D.DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.