单项选择题
A. show security utm content-filtering statistics
B. show security flow session
C. show security flow statistics
D. show security utm content-filtering summary
多项选择题 Which two statements are true for a security policy? ()(Choose two.)
单项选择题 A network administrator repeatedly receives support calls about network issues. After investigating the issues, the administrator finds that the source NAT pool is running out of addresses.To be notified that the pool is close to exhaustion, what should the administrator configure?()
多项选择题 Which three situations will trigger an e-mail to be flagged as spam if a branch SRX Series device has been properly configured with antispam inspection enabled for the appropriate security policy? ()(Choose three.)