更多“多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS”相关问题
  • 第1题:

    On which three traffic types does firewall pass-through authentication work? ()(Choose three.)

    A. ping

    B. FTP

    C. Telnet

    D. HTTP

    E. HTTPS


    参考答案:B, C, D

  • 第2题:

    Which three statistics does the Executive report summarize?() (Choose three.)

    • A、latency and loss
    • B、compression results
    • C、traffic (by application)
    • D、CRC and alignment errors
    • E、user access (by username)

    正确答案:A,B,C

  • 第3题:

    Which two traffic types trigger pass-through firewall user authentication?()

    • A、SSH
    • B、Telnet
    • C、ICMP
    • D、OSPF
    • E、HTTP

    正确答案:B,E

  • 第4题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第5题:

    Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)

    • A、Fast Connection Setup
    • B、TCP Acceleration (AFP)
    • C、Network Sequence Caching
    • D、AppFlow's MAPI acceleration
    • E、Molecular Sequence Reduction

    正确答案:B,D,E

  • 第6题:

    多选题
    Which of the following are types of flow control (Choose three.)()。
    A

    buffering

    B

    cut-through

    C

    windowing

    D

    congestion avoidance

    E

    load balancing


    正确答案: B,E
    解析: 暂无解析

  • 第7题:

    多选题
    Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN (Choose three.)()。
    A

    HDLC

    B

    Ethernet

    C

    Token Ring

    D

    PPP

    E

    FDDI

    F

    Frame Relay


    正确答案: E,A
    解析: 暂无解析

  • 第8题:

    多选题
    Which three types of content filtering are supported only for HTTP? ()(Choose three.)
    A

    block Flash

    B

    block Java applets

    C

    block ActiveX

    D

    block EXE files

    E

    block MIME type


    正确答案: E,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which three statistics does the Executive report summarize?() (Choose three.)
    A

    latency and loss

    B

    compression results

    C

    traffic (by application)

    D

    CRC and alignment errors

    E

    user access (by username)


    正确答案: A,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which three types of integration does the Business Event System support?() (Choose three.)
    A

    point-to-point

    B

    parent/child messaging

    C

    messaging hub system

    D

    distributed applications messaging

    E

    simple object access protocol (SOAP) messaging


    正确答案: E,C
    解析: 暂无解析

  • 第11题:

    多选题
    Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)
    A

    MIME pattern

    B

    file extension

    C

    IP spoofing

    D

    POP3

    E

    protocol command


    正确答案: A,D
    解析: 暂无解析

  • 第12题:

    多选题
    Which three advanced permit actions within security policies are valid?() (Choose three.)
    A

    Mark permitted traffic for firewall user authentication.

    B

    Mark permitted traffic for SCREEN options.

    C

    Associate permitted traffic with an IPsec tunnel.

    D

    Associate permitted traffic with a NAT rule.

    E

    Mark permitted traffic for IDP processing.


    正确答案: B,D
    解析: 暂无解析

  • 第13题:

    Which three ports does a WX device use for control traffic purposes?() (Choose three.)

    A. 3577 UDP

    B. 3578 UDP

    C. 3678 UDP

    D. 3577 TCP

    E. 3578 TCP


    参考答案:B, D, E

  • 第14题:

    On which three traffic types does firewall pass-through authentication work? ()(Choose three.)

    • A、ping
    • B、FTP
    • C、Telnet
    • D、HTTP
    • E、HTTPS

    正确答案:B,C,D

  • 第15题:

    Which three advanced permit actions within security policies are valid?() (Choose three.)

    • A、Mark permitted traffic for firewall user authentication.
    • B、Mark permitted traffic for SCREEN options.
    • C、Associate permitted traffic with an IPsec tunnel.
    • D、Associate permitted traffic with a NAT rule.
    • E、Mark permitted traffic for IDP processing.

    正确答案:A,C,E

  • 第16题:

    Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)

    • A、MIME pattern
    • B、file extension
    • C、IP spoofing
    • D、POP3
    • E、protocol command

    正确答案:A,B,E

  • 第17题:

    Which three types of integration does the Business Event System support?() (Choose three.)

    • A、point-to-point
    • B、parent/child messaging
    • C、messaging hub system
    • D、distributed applications messaging
    • E、simple object access protocol (SOAP) messaging

    正确答案:A,C,D

  • 第18题:

    多选题
    Which two traffic types trigger pass-through firewall user authentication?()
    A

    SSH

    B

    Telnet

    C

    ICMP

    D

    OSPF

    E

    HTTP


    正确答案: D,E
    解析: 暂无解析

  • 第19题:

    多选题
    On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
    A

    ping

    B

    FTP

    C

    Telnet

    D

    HTTP

    E

    HTTPS


    正确答案: A,E
    解析: 暂无解析

  • 第20题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: A,C
    解析: 暂无解析

  • 第21题:

    多选题
    Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()
    A

    onboard VPN accelerator

    B

    events correlation and proactive response

    C

    high-performance AIM VPN modules

    D

    virtual firewall

    E

    Cisco lOS Firewall and lOS IPS

    F

    transparent firewall


    正确答案: B,A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第23题:

    多选题
    Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)
    A

    Fast Connection Setup

    B

    TCP Acceleration (AFP)

    C

    Network Sequence Caching

    D

    AppFlow's MAPI acceleration

    E

    Molecular Sequence Reduction


    正确答案: E,B
    解析: 暂无解析

  • 第24题:

    多选题
    Which three ports does a WX device use for control traffic purposes?() (Choose three.)
    A

    3577 UDP

    B

    3578 UDP

    C

    3678 UDP

    D

    3577 TCP

    E

    3578 TCP


    正确答案: D,C
    解析: 暂无解析