What does the device do?
Click the Exhibit button.
[edit security]
user@host# show
zones {
security-zone ZoneA {
tcp-rst;
host-inbound-traffic {
system-services {
ping;
telnet;
}}
interfaces {
ge-0/0/0.0;
ge-0/0/1.0;
}}
security-zone ZoneB {
interfaces {
ge-0/0/3.0;
}}}
policies {
from-zone ZoneA to-zone ZoneB {
policy A-to-B {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}}}}
In the exhibit, a host attached to interface ge-0/0/0.0 sends a SYN packet to open a Telnet
connection to the device’s ge-0/0/1.0 IP address.
What does the device do?
Which two commands can be used to monitor firewall user authentication?
Which two commands can be used to monitor firewall user authentication? (Choose two.)
Which two external authentication server types are supported by JUNOS Software for firewall user authenticatio
Which two external authentication server types are supported by JUNOS Software for
firewall user authentication? (Choose two.)
which two traffic types are permitted when the destination is the ge- 0/0/0.0 IP address?
Click the Exhibit button.
[edit security zones security-zone trust]
user@host# show
host-inbound-traffic {
system-services {
all;
}}
interfaces {
ge-0/0/0.0;
}
Referring to the exhibit, which two traffic types are permitted when the destination is the ge-
0/0/0.0 IP address? (Choose two.)
What are three main phases of an attack?
What are three main phases of an attack? (Choose three.)
Which type of an attack does this scenario describe?
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port
replies. Which type of an attack does this scenario describe?
Where do you configure SCREEN options?
Where do you configure SCREEN options?
Which mechanism would you configure to achieve this objective?
Prior to applying SCREEN options to drop traffic, you want to determine how your
configuration will affect traffic.
Which mechanism would you configure to achieve this objective?
Which two statements describe the purpose of a security policy?
Which two statements describe the purpose of a security policy? (Choose two.)
What will happen to the traffic given the configuration in the exhibit?
Exhibit.
[edit security policies]
user@host# show
from-zone trust to-zone untrust {
policy AllowHTTP{
match {
source-address HOSTA;
destination-address any;
application junos-ftp;
}
then {
permit;
}}
policy AllowHTTP2{
match {
source-address any;
destination-address HOSTA;
application junos-http;
}
then {
permit;
}}
policy AllowHTTP3{
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}}}
A flow of HTTP traffic needs to go from HOSTA to HOSTB. Assume that traffic will initiate
from HOSTA and that HOSTA is in zone trust and HOSTB is in zone untrust.
What will happen to the traffic given the configuration in the exhibit?