1.
Regarding attacks, which statement is correct?
2.
For IKE phase 1 negotiations, when is aggressive mode typically used?
3.
A traditional router is better suited than a firewall device for which function?
4.
Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many flows exist between Host A and Host B?
5.
You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone. Under which configuration hierarchy must you permit OSPF traffic?
6.
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?
7.
Where do you configure SCREEN options?
8.
Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?
9.
You must configure a SCREEN option that would protect your device from a session table flood. Which configuration meets this requirement?
10.
Which parameters are valid SCREEN options for combating operating system probes?