多选题Users can define policy to control traffic flow between which two components?()Afrom a zone to the device itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface

题目
多选题
Users can define policy to control traffic flow between which two components?()
A

from a zone to the device itself

B

from a zone to the same zone

C

from a zone to a different zone

D

from one interface to another interface


相似考题
参考答案和解析
正确答案: B,A
解析: 暂无解析
更多“多选题Users can define policy to control traffic flow between which two components?()Afrom a zone to the device itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface”相关问题
  • 第1题:

    Which two of these are characteristics of an IPS device?()

    • A、 passively listens to network traffic
    • B、 is an active device in the traffic path
    • C、 has a permissive interface that is used to monitor networks
    • D、 traffic arrives on one IPS interface and exits on another

    正确答案:B,D

  • 第2题:

    You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()

    • A、[edit security policies from-zone HR to-zone HR]
    • B、[edit security zones functional-zone management protocols]
    • C、[edit security zones protocol-zone HR host-inbound-traffic]
    • D、[edit security zones security-zone HR host-inbound-traffic protocols]

    正确答案:D

  • 第3题:

    You want to allow your device to establish OSPF adjacencies with a neighboring device connected tointerface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()

    • A、[edit security policies from-zone HR to-zone HR]
    • B、[edit security zones functional-zone management protocols]
    • C、[edit security zones protocol-zone HR host-inbound-traffic]
    • D、[edit security zones security-zone HR host-inbound-traffic protocols]

    正确答案:D

  • 第4题:

    Which two steps are performed when configuring a zone?()

    • A、Define a default policy for the zone.
    • B、Assign logical interfaces to the zone.
    • C、Assign physical interfaces to the zone.
    • D、Define the zone as a security or functional zone

    正确答案:B,D

  • 第5题:

    Users can define policy to control traffic flow between which two components?()

    • A、from a zone to the device itself
    • B、from a zone to the same zone
    • C、from a zone to a different zone
    • D、from one interface to another interface

    正确答案:B,C

  • 第6题:

    Users can define policy to control traffic flow between which two components? ()(Choose two.)

    • A、from a zone to the router itself
    • B、from a zone to the same zone
    • C、from a zone to a different zone
    • D、from one interface to another interface

    正确答案:B,C

  • 第7题:

    Regarding zone types, which statement is true?()

    • A、You cannot assign an interface to a functional zone.
    • B、You can specifiy a functional zone in a security policy.
    • C、Security zones must have a scheduler applied.
    • D、You can use a security zone for traffic destined for the device itself.

    正确答案:D

  • 第8题:

    多选题
    Which two statements are true for a security policy? ()(Choose two.)
    A

    It controls inter-zone traffic.

    B

    It controls intra-zone traffic.

    C

    It is named with a system-defined name.

    D

    It controls traffic destined to the device's ingress interface.


    正确答案: D,A
    解析: 暂无解析

  • 第9题:

    单选题
    Which statement best describes Cisco IOS Zone-Based Policy Firewall?()
    A

    A router interface can belong to multiple zones.

    B

    Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.

    C

    The pass action works in only one direction

    D

    A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    Which two of these are characteristics of an IPS device?()
    A

    passively listens to network traffic

    B

    is an active device in the traffic path

    C

    has a permissive interface that is used to monitor networks

    D

    traffic arrives on one IPS interface and exits on another


    正确答案: D,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two steps are performed when configuring a zone?()
    A

    Define a default policy for the zone.

    B

    Assign logical interfaces to the zone.

    C

    Assign physical interfaces to the zone.

    D

    Define the zone as a security or functional zone


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    Users can define policy to control traffic flow between which two components? ()(Choose two.)
    A

    from a zone to the router itself

    B

    from a zone to the same zone

    C

    from a zone to a different zone

    D

    from one interface to another interface


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    Which statement best describes Cisco IOS Zone-Based Policy Firewall?()

    • A、A router interface can belong to multiple zones.
    • B、Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.
    • C、The pass action works in only one direction
    • D、A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.

    正确答案:C

  • 第14题:

    Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()

    • A、Pass
    • B、Flow
    • C、Allow
    • D、Inspect

    正确答案:A,D

  • 第15题:

    You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()

    • A、You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
    • B、No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
    • C、You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
    • D、You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

    正确答案:A

  • 第16题:

    Which two statements are true for a security policy? ()(Choose two.)

    • A、It controls inter-zone traffic.
    • B、It controls intra-zone traffic.
    • C、It is named with a system-defined name.
    • D、It controls traffic destined to the device's ingress interface.

    正确答案:A,B

  • 第17题:

    Which statement describes a security zone?()

    • A、A security zone can contain one or more interfaces.
    • B、A security zone can contain interfaces in multiple routing instances.
    • C、A security zone must contain two or more interfaces.
    • D、A security zone must contain bridge groups.

    正确答案:A

  • 第18题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    • A、Traffic is permitted from the trust zone to the untrust zone.
    • B、Intrazone traffic in the trust zone is permitted.
    • C、All traffic through the device is denied.
    • D、The policy is matched only when no other matching policies are found.

    正确答案:C,D

  • 第19题:

    多选题
    Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
    A

    DNS traffic is denied.

    B

    HTTP traffic is denied.

    C

    FTP traffic is permitted.

    D

    SMTP traffic is permitted.


    正确答案: C,B
    解析: 暂无解析

  • 第20题:

    多选题
    Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()
    A

    Pass

    B

    Flow

    C

    Allow

    D

    Inspect


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    多选题
    Users can define policy to control traffic flow between which two components?()
    A

    from a zone to the device itself

    B

    from a zone to the same zone

    C

    from a zone to a different zone

    D

    from one interface to another interface


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    单选题
    You want to allow your device to establish OSPF adjacencies with a neighboring device connected tointerface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
    A

    [edit security policies from-zone HR to-zone HR]

    B

    [edit security zones functional-zone management protocols]

    C

    [edit security zones protocol-zone HR host-inbound-traffic]

    D

    [edit security zones security-zone HR host-inbound-traffic protocols]


    正确答案: A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
    A

    Traffic is permitted from the trust zone to the untrust zone.

    B

    Intrazone traffic in the trust zone is permitted.

    C

    All traffic through the device is denied.

    D

    The policy is matched only when no other matching policies are found.


    正确答案: C,A
    解析: 暂无解析

  • 第24题:

    多选题
    Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
    A

    DNS traffic is denied.

    B

    HTTP traffic is denied.

    C

    FTP traffic is permitted.

    D

    SMTP traffic is permitted.


    正确答案: D,A
    解析: 暂无解析