READ Free Dumps For Juniper- JN0-332
Question ID 12386 | Which three security policy actions are valid? (Choose three.) |
Option A | deny |
Option B | allow |
Option C | permit |
Option D | reject |
Option E | discard |
Correct Answer | A,C,D |
Question ID 12387 | Click the Exhibit button. Referring to the exhibit, which statement contains thecorrect gateway parameters? |
Option A | [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; } |
Option B | [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; } |
Option C | [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; } |
Option D | [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; } |
Correct Answer | B |