READ Free Dumps For Juniper- JN0-332
Question ID 12454 | Which two firewall user authentication objects can be referenced in a security policy? |
Option A | access profile |
Option B | client group |
Option C | client |
Option D | default profile |
Correct Answer | B,C |
Question ID 12455 | Which two steps are performed when configuring a zone? (Choose two.) |
Option A | Define a default policy for the zone. |
Option B | Assign logical interfaces to the zone. |
Option C | Assign physical interfaces to the zone. |
Option D | Define the zone as a security or functional zone. |
Correct Answer | B,D |