What are two system-defined zones?
What are two system-defined zones? (Choose two.)
Which statement is correct about zone and interface dependencies?
Which statement is correct about zone and interface dependencies?
What are two functions of the junos-host zone?
What are two functions of the junos-host zone? (Choose two.)
Which two parameters are configurable under the [edit security zones security-zone zoneA] stanza?
Which two parameters are configurable under the [edit security zones security-zone zoneA] stanza? (Choose
two.)
What are two predefined address-book entries?
What are two predefined address-book entries? (Choose two.)
What are two valid network prefixes in address books?
What are two valid network prefixes in address books? (Choose two.)
Which operational command would be used to accomplish this?
You want to show interface-specific zone information and statistics. Which operational command would be
used to accomplish this?
Which two statements are correct regarding the security policy parameter policy-rematch?
Which two statements are correct regarding the security policy parameter policy-rematch? (Choose two.)
what will happen to the return traffic?
An engineer has just created a single policy allowing ping traffic from a host in the Users zone to a server in the
Servers zone.
When the host pings the server, what will happen to the return traffic?
What are two reasons why users would be able to ping between these zones?
Following a recent security audit, you find that users are able to ping between the untrust zone and the trust
zone, which is contrary to your organization’s current security policy. On examination of the current security
policies, you find no policies that would allow these connections.
What are two reasons why users would be able to ping between these zones? (Choose two.)