You must secure network access by requiring users to log in through an HTTP browser, while also allowing printers to connect to the network using MAC address validation. What will satisfy these requirements?
A. 802. IX multiple supplicant
B. MAC RADIUS
C. captive portal
D. guest VLAN
正解:B
質問 2:
As part of your service provider WAN network design, you are asked to create a design that secures BGP communication .
In this scenario, what are two reasons you would choose BGP Generated TTL Security Mechanism (GTSM)? (Choose two.)
A. All of your router BGP connections are point-to-multipoint.
B. You do not have an easy method of rotating MD5 hashes on each router
C. AlI of your router BGP connections are point-to-point
D. You have an automated method of rotating MD5 hashes on each router.
正解:A,B
質問 3:
Which statement about Junos firewall filters is correct?
A. Firewall filters can be applied as a security policy action
B. Firewall filters do not operate on stateful flows and they serve no purpose in a next-generation firewall
C. Firewall filters are applied to TCP packets only. and they do not block UDP pockets
D. Firewall filters can be applied as the packet enters the security device, and they are stateless.
正解:B
質問 4:
When considering the data center, which two security aspects must be considered? (Choose two)
A. conceptual
B. theoretical
C. logical
D. physical
正解:B
質問 5:
You are designing a security solution that includes SRX Series firewalls in a chassis cluster.
In this scenario. which two dements must be part of the design? (Choose two.)
A. The physical interface on each SRX Series device making up the reth interface must be in the same L2 domain
B. The node 10 must be the same on both SRX Series devices
C. The duster ID must be the same on both SRX Series devices
D. The physical interface on each SRX Series device making up the reth interface must be in separate L2 domains
正解:D
質問 6:
You are asked to perform a risk assessment for a core layer switch in your data center. After analyze the Annual loss Expectancy (ALE) for this switch, you conclude that the risk remediation strategy involves purchasing insurance to protect against losses due to compromise or failure.
This scenario describes which risk remediation strategy?
A. risk mitigation
B. risk avoidance
C. risk acceptance
D. risk transfer
正解:C
質問 7:
You are asked to deploy multiple kiosk locations around the country. Their locations will change frequently and will need to access services in the corporate data center as well as other kiosk locations You need a central key location In this scenario, which solution would you deploy?
A. Juniper Secure Connect
B. Auto VPN
C. Group VPN
D. Mesh VPN
正解:B
Hoshino -
JN0-1332のこういう問題集はあると非常に重宝します。加点ポイント高いです。Pass4Testさんのお陰でいい内容に出会いました。しかも試験の問題にも入ていて、高得点で受かりました。