参考答案和解析
正确答案: C,A
解析: 暂无解析
更多“多选题Which three represent IDP policy match conditions? ()(Choose three.)AprotocolBsource-addressCportDapplicationEattacks”相关问题
  • 第1题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    A. access profile

    B. client group

    C. client

    D. default profile

    E. external


    参考答案:A, B, C

  • 第2题:

    Which three packet interception methods are configurable in WX devices?() (Choose three.)

    • A、OSPF
    • B、WCCP
    • C、policy based routing
    • D、route injection using RIPv1
    • E、route injection using RIPv2

    正确答案:B,C,E

  • 第3题:

    You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()

    • A、activating a JUNOS Software commit script
    • B、configuring an IDP groups statement
    • C、setting up a chassis cluster
    • D、downloading the IDP policy templates
    • E、installing the policy templates

    正确答案:A,D,E

  • 第4题:

    Which three parameters are configured in the IKE policy? ()(Choose three.)

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第5题:

    Which three represent IDP policy match conditions? ()(Choose three.)

    • A、protocol
    • B、source-address
    • C、port
    • D、application
    • E、attacks

    正确答案:B,D,E

  • 第6题:

    多选题
    Which three BGP states are associated with establishing TCP connectivity?() (Choose three.)
    A

    Idle

    B

    Active

    C

    Connect

    D

    Open Sent

    E

    Established


    正确答案: E,C
    解析: 暂无解析

  • 第7题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: A,C
    解析: 暂无解析

  • 第8题:

    多选题
    Which three features are part of the branch SRX series UTM suite?() (Choose three.)
    A

    antispam

    B

    antivirus

    C

    IPS

    D

    application firewalling

    E

    Web filtering


    正确答案: C,A
    解析: 暂无解析

  • 第9题:

    多选题
    You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()
    A

    activating a JUNOS Software commit script

    B

    configuring an IDP groups statement

    C

    setting up a chassis cluster

    D

    downloading the IDP policy templates

    E

    installing the policy templates


    正确答案: E,C
    解析: 暂无解析

  • 第10题:

    多选题
    The Origin attribute describes the source of the BGP prefix. Which three are valid Origin codes?() (Choose three.)
    A

    IGP

    B

    BGP

    C

    EGP

    D

    Incomplete

    E

    Anonymous


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which three parameters are configured in the IKE policy? ()(Choose three.)
    A

    mode

    B

    preshared key

    C

    external interface

    D

    security proposals

    E

    dead peer detection settings


    正确答案: D,E
    解析: 暂无解析

  • 第12题:

    多选题
    Which three advanced permit actions within security policies are valid?() (Choose three.)
    A

    Mark permitted traffic for firewall user authentication.

    B

    Mark permitted traffic for SCREEN options.

    C

    Associate permitted traffic with an IPsec tunnel.

    D

    Associate permitted traffic with a NAT rule.

    E

    Mark permitted traffic for IDP processing.


    正确答案: B,D
    解析: 暂无解析

  • 第13题:

    Which three options represent IDP policy match conditions?()

    • A、protocol
    • B、source-address
    • C、port
    • D、application
    • E、attacks

    正确答案:B,D,E

  • 第14题:

    Which three options represent IDP policy match conditions? ()(Choose three.)

    • A、service
    • B、to-zone
    • C、attacks
    • D、port
    • E、destination-address

    正确答案:B,C,E

  • 第15题:

    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

    • A、zone objects
    • B、policy objects
    • C、attack objects
    • D、alert and notify objects
    • E、network and address objects

    正确答案:A,C,E

  • 第16题:

    Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)

    • A、routing-instance
    • B、zone
    • C、interface
    • D、policy
    • E、rule-set

    正确答案:A,B,C

  • 第17题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第18题:

    多选题
    Which three applications are disabled for compression by default?() (Choose three.)
    A

    FTP

    B

    SSH

    C

    UDP

    D

    HTTPS

    E

    Traceroute


    正确答案: B,C
    解析: 暂无解析

  • 第19题:

    多选题
    Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)
    A

    routing-instance

    B

    zone

    C

    interface

    D

    policy

    E

    rule-set


    正确答案: E,C
    解析: 暂无解析

  • 第20题:

    多选题
    Which are valid modes for a switch port used as a VLAN trunk (Choose three.)()。
    A

    transparent

    B

    auto

    C

    on

    D

    desirable

    E

    blocking

    F

    forwarding


    正确答案: A,D
    解析: 暂无解析

  • 第21题:

    多选题
    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
    A

    zone objects

    B

    policy objects

    C

    attack objects

    D

    alert and notify objects

    E

    network and address objects


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which three options represent IDP policy match conditions? ()(Choose three.)
    A

    service

    B

    to-zone

    C

    attacks

    D

    port

    E

    destination-address


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which three represent IDP policy match conditions? ()(Choose three.)
    A

    protocol

    B

    source-address

    C

    port

    D

    application

    E

    attacks


    正确答案: D,C
    解析: 暂无解析

  • 第24题:

    多选题
    Which three options represent IDP policy match conditions?()
    A

    protocol

    B

    source-address

    C

    port

    D

    application

    E

    attacks


    正确答案: A,B
    解析: 暂无解析