多选题Which two statements describe the purpose of a security policy?()AIt enables traffic counting and logging.BIt enforces a set of rules for transit traffic.CIt controls host inbound services on a zone.DIt controls administrator rights to access the devic

题目
多选题
Which two statements describe the purpose of a security policy?()
A

It enables traffic counting and logging.

B

It enforces a set of rules for transit traffic.

C

It controls host inbound services on a zone.

D

It controls administrator rights to access the device.


相似考题
参考答案和解析
正确答案: C,D
解析: 暂无解析
更多“多选题Which two statements describe the purpose of a security policy?()AIt enables traffic counting and logging.BIt enforces a set of rules for transit traffic.CIt controls host inbound services on a zone.DIt controls administrator rights to access the devic”相关问题
  • 第1题:

    Which two statements regarding JUNOS architecture are correct?()

    • A、The Routing Engine handles all exception traffic.
    • B、The Routing Engine synchronizes the route table with the PFE
    • C、The Routing Engine is hot-pluggable.
    • D、The Routing Engine controls the PFE

    正确答案:C,D

  • 第2题:

    You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()

    • A、You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
    • B、No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
    • C、You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
    • D、You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

    正确答案:A

  • 第3题:

    Which two statements describe the purpose of a security policy?()

    • A、It enables traffic counting and logging.
    • B、It enforces a set of rules for transit traffic.
    • C、It controls host inbound services on a zone.
    • D、It controls administrator rights to access the device.

    正确答案:A,B

  • 第4题:

    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

    • A、[edit security idp]
    • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
    • C、[edit security zones security-zone trust]
    • D、[edit security screen]

    正确答案:B,C

  • 第5题:

    Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)

    • A、Addresses used for NAT pools should never overlap.
    • B、If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.
    • C、If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.
    • D、Dynamic source NAT rules take precedence over static source NAT rules.

    正确答案:A,B

  • 第6题:

    多选题
    Which two statements in a source NAT configuration are true regarding addresses, rule-sets, or rules that overlap?()(Choose two.)
    A

    Addresses used for NAT pools should never overlap.

    B

    If more than one rule-set matches traffic, the rule-set with the most specific context takes precedence.

    C

    If traffic matches two rules within the same rule-set, both rules listed in the configuration are applied.

    D

    Dynamic source NAT rules take precedence over static source NAT rules.


    正确答案: C,D
    解析: 暂无解析

  • 第7题:

    多选题
    Which two statements are true for a security policy? ()(Choose two.)
    A

    It controls inter-zone traffic.

    B

    It controls intra-zone traffic.

    C

    It is named with a system-defined name.

    D

    It controls traffic destined to the device's ingress interface.


    正确答案: D,A
    解析: 暂无解析

  • 第8题:

    多选题
    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
    A

    [edit security idp]

    B

    [edit security zones security-zone trust interfaces ge-0/0/0.0]

    C

    [edit security zones security-zone trust]

    D

    [edit security screen]


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements describe the purpose of a security policy?()
    A

    It enables traffic counting and logging.

    B

    It enforces a set of rules for transit traffic.

    C

    It controls host inbound services on a zone.

    D

    It controls administrator rights to access the device.


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements regarding JUNOS architecture are correct?()
    A

    The Routing Engine handles all exception traffic.

    B

    The Routing Engine synchronizes the route table with the PFE

    C

    The Routing Engine is hot-pluggable.

    D

    The Routing Engine controls the PFE


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    多选题
    From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()
    A

    extends networkQoS throughout the network

    B

    simplifies management of central or remotely locates access points

    C

    ensures implementation of the most recent security protocols

    D

    streamlines wireless LAN management

    E

    extends features for optical traffic network services


    正确答案: C,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
    A

    Traffic is permitted from the trust zone to the untrust zone.

    B

    Intrazone traffic in the trust zone is permitted.

    C

    All traffic through the device is denied.

    D

    The policy is matched only when no other matching policies are found.


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Which two configuration options must be present for IPv4 transit traffic to pass between the ge-0/0/0.0 andge-0/0/2.0 interfaces?()

    • A、family inet
    • B、a security zone
    • C、a routing instance
    • D、host-inbound-traffic

    正确答案:A,B

  • 第14题:

    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

    • A、Source IP and browser
    • B、Source IP and certificate
    • C、Certificate and Host Checker
    • D、Host Checker and source IP

    正确答案:D

  • 第15题:

    Which two statements are true for a security policy? ()(Choose two.)

    • A、It controls inter-zone traffic.
    • B、It controls intra-zone traffic.
    • C、It is named with a system-defined name.
    • D、It controls traffic destined to the device's ingress interface.

    正确答案:A,B

  • 第16题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    • A、Traffic is permitted from the trust zone to the untrust zone.
    • B、Intrazone traffic in the trust zone is permitted.
    • C、All traffic through the device is denied.
    • D、The policy is matched only when no other matching policies are found.

    正确答案:C,D

  • 第17题:

    Which two configuration elements are required for a route-based VPN?()

    • A、secure tunnel interface
    • B、security policy to permit the IKE traffic
    • C、a route for the tunneled transit traffic
    • D、tunnel policy for transit traffic referencing the IPsec VPN

    正确答案:A,C

  • 第18题:

    多选题
    Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
    A

    DNS traffic is denied.

    B

    HTTP traffic is denied.

    C

    FTP traffic is permitted.

    D

    SMTP traffic is permitted.


    正确答案: C,B
    解析: 暂无解析

  • 第19题:

    多选题
    Which two statements are true regarding IDP?()
    A

    IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.

    C

    IDP inspects traffic up to the Presentation layer.

    D

    IDP inspects traffic up to the Application layer.


    正确答案: A,B
    解析: 暂无解析

  • 第20题:

    多选题
    You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
    A

    The endpoints can use agentless access.

    B

    Encrypted traffic flows between the endpoint and the enforcer.

    C

    Encrypted traffic flows between the endpoint and the protected resource

    D

    The endpoints can use the Odyssey Access Client.


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which two configuration options must be present for IPv4 transit traffic to pass between the ge-0/0/0.0 andge-0/0/2.0 interfaces?()
    A

    family inet

    B

    a security zone

    C

    a routing instance

    D

    host-inbound-traffic


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    多选题
    From small business to large-scale enterprises, which two best describe how the Cisco Unified Wireless Network reduces overall operational expenses? ()
    A

    extends networkQoS throughout the network

    B

    simplifies management of central or remotely located access points

    C

    ensures implementation of the most recent security protocols

    D

    streamlines wireless LAN management

    E

    extends features for optical traffic network services


    正确答案: C,E
    解析: 暂无解析

  • 第23题:

    多选题
    Which two configuration elements are required for a route-based VPN?()
    A

    secure tunnel interface

    B

    security policy to permit the IKE traffic

    C

    a route for the tunneled transit traffic

    D

    tunnel policy for transit traffic referencing the IPsec VPN


    正确答案: B,A
    解析: 暂无解析

  • 第24题:

    多选题
    Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
    A

    DNS traffic is denied.

    B

    HTTP traffic is denied.

    C

    FTP traffic is permitted.

    D

    SMTP traffic is permitted.


    正确答案: D,A
    解析: 暂无解析