Where do you configure SCREEN options?
Where do you configure SCREEN options?
Which mechanism would you configure to achieve this objective?
Prior to applying SCREEN options to drop traffic, you want to determine how your configuration
will affect traffic.
Which mechanism would you configure to achieve this objective?
Which two configurations meet this requirement?
You are required to configure a SCREEN option that enables IP source route option detection.
Which two configurations meet this requirement? (Choose two.)
Which two statements describe the purpose of a security policy?
Which two statements describe the purpose of a security policy? (Choose two.)
What will happen to the traffic given the configuration in the exhibit?
Click the Exhibit button.
[edit security policies]
user@host# show
from-zone trust to-zone untrust {
policy AllowHTTP{
match {
source-address HOSTA;
destination-address any;
application junos-ftp;
}
then {
permit;
}}
policy AllowHTTP2{
match {
source-address any;
destination-address HOSTA;
application junos-http;
}
then {
permit;
}}
policy AllowHTTP3{
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}}}
A flow of HTTP traffic needs to go from HOSTA to HOSTB. Assume that traffic will initiate from
HOSTA and that HOSTA is in zone trust and HOSTB is in zone untrust.
What will happen to the traffic given the configuration in the exhibit?
Which two security policy actions are valid?
Which two security policy actions are valid? (Choose two.)
what will happen to the traffic matching the security policy?
Click the Exhibit button.
[edit schedulers]
user@host# show
scheduler now {
monday all-day;
tuesday exclude;
wednesday {
start-time 07:00:00 stop-time 18:00:00;
}
thursday {
start-time 07:00:00 stop-time 18:00:00;
}}
[edit security policies from-zone Private to-zone External]
user@host# show
policy allowTransit {
match {
source-address PrivateHosts;
destination-address ExtServers;
application ExtApps;
}
then {
permit {
tunnel {
ipsec-vpn myTunnel;
}}}
scheduler-name now;
}
Based on the configuration shown in the exhibit, what will happen to the traffic matching the
security policy?
which statement is true about traffic from host_a to host_b?
Click the Exhibit button.
[edit security policies from-zone HR to-zone trust]
user@host# show
policy two {
match {
source-address subnet_a;
destination-address host_b;
application [ junos-telnet junos-ping ];
}
then {
reject;
}} policy one {
match {
source-address host_a;
destination-address subnet_b;
application any;
}
then {
permit;
}}
host_a is in subnet_a and host_b is in subnet_b.
Given the configuration shown in the exhibit, which statement is true about traffic from host_a to
host_b?
Which statement is true about interface-based source NAT?
Which statement is true about interface-based source NAT?
Which two statements are true about pool-based destination NAT?
Which two statements are true about pool-based destination NAT? (Choose two.)