Which operational command would be used to accomplish this?
You want to show interface-specific zone information and statistics. Which operational
command would be used to accomplish this?
Which statement is true about routing tables on a Junos device?
Which statement is true about routing tables on a Junos device?
Which configuration will resolve this problem?
[edit policy-options]
user@router# show
policy-statement block-routes {
term 1 {
from {
route-filter 172.27.0.0/24 longer;
}
then reject;
}
term 2 {
then accept;
}
}
You are asked to ensure that your device does not accept any prefixes within the 172.27.0.0/24
network. You have applied the policy shown in the exhibit, but the 172.27.0.0/24 route is still
present on your device.
Which configuration will resolve this problem?
Which two statements are correct regarding the security policy parameter policy-rematch?
Which two statements are correct regarding the security policy parameter policy-rematch?
(Choose two.)
Which statement is true regarding the Junos OS?
Which statement is true regarding the Junos OS?
which three networks match the policy?
[edit policy-options policy-statement my-policy]
user@router# show
term 1 {
from {
route-filter 192.168.0.0/16 orlonger;
}
then accept;
}
Referring to the exhibit, which three networks match the policy? (Choose three.)
what will happen to the return traffic?
An engineer has just created a single policy allowing ping traffic from a host in the Users
zone to a server in the Servers zone.
When the host pings the server, what will happen to the return traffic?
Which operational command will display this information?
A network administrator would like to view detailed interface status, properties, statistics,
errors, and CoS packet counters. Which operational command will display this information?
What will happen when it is processed by the firewall filter shown in the exhibit?
firewall {
filter select-telnet {
term 1 {
from {
source-address {
10.0.0.0/8;
}
}
then log;
}
term 2 {
from {
protocoltcp;
port telnet;
}
then {
syslog;
reject;
}
}
term 3 {
from {
source-address {
10.1.1.1/32;
}
protocoltcp;
port telnet;
}
then {
sample;
accept;
}
}
}
}
A Telnet session is initiated from host 10.1.1.1.
What will happen when it is processed by the firewall filter shown in the exhibit?
What are two reasons why users would be able to ping between these zones?
Following a recent security audit, you find that users are able to ping between the untrust
zone and the trust zone, which is contrary to your organization’s current security policy. On
examination of the current security policies, you find no policies that would allow these
connections.
What are two reasons why users would be able to ping between these zones? (Choose two.)