单项选择题
A. 1 minute B. 15 minutes C. 30 minutes D. 90 minutes
Which three firewall user authentication objects can be...
多项选择题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
A. access profile B. client group C. client D. default profile E. external
Which three methods of source NAT does the Junos OS sup...
多项选择题Which three methods of source NAT does the Junos OS support?() (Choose three.)
A. interface-based source NAT B. source NAT with address shifting C. source NAT using static source pool D. interface-based source NAT without PAT E. source NAT with address shifting and PAT
Under which Junos hierarchy level are security policies...
单项选择题Under which Junos hierarchy level are security policies configured?()
A. [edit security] B. [edit protocols] C. [edit firewall] D. [edit policy-options]