参考答案和解析
正确答案: B,C
解析: 暂无解析
更多“多选题What are three configuration objects used to build JUNOS IDP rules?()Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects”相关问题
  • 第1题:

    Which three objects can be components of a menu module?() 

    • A、windows 
    • B、parameters 
    • C、object groups 
    • D、report objects 
    • E、visual attributes 

    正确答案:B,C,E

  • 第2题:

    Which three statements are true regarding IDP?()

    • A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
    • B、IDP inspects traffic up to the Application layer.
    • C、IDP searches the data stream for specific attack patterns.
    • D、IDP inspects traffic up to the Presentation layer.
    • E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

    正确答案:B,C,E

  • 第3题:

    Information about a managed devices resources and activity is defined by a series of objects. What defines the structure of these management objects?()

    • A、MIB
    • B、FIB
    • C、LDAP
    • D、CEF

    正确答案:A

  • 第4题:

    You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()

    • A、activating a JUNOS Software commit script
    • B、configuring an IDP groups statement
    • C、setting up a chassis cluster
    • D、downloading the IDP policy templates
    • E、installing the policy templates

    正确答案:A,D,E

  • 第5题:

    An authentication request for a PPP over ATM client has been returned to the router with an address of 255.255.255.254. What does this indicate to the router?()

    • A、A static IP address is used.
    • B、An unnumbered address is used.
    • C、The returned RADIUS address is used.
    • D、The IP address-pool configuration is used.

    正确答案:D

  • 第6题:

    What are three configuration objects used to build JUNOS IDP rules?()

    • A、zone objects
    • B、policy objects
    • C、attack objects
    • D、alert and notify objects
    • E、network and address objects

    正确答案:A,C,E

  • 第7题:

    多选题
    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
    A

    protocol

    B

    VLAN number

    C

    TCP or UDP port numbers

    D

    source switch port number

    E

    source IP address and destination IP address

    F

    source MAC address and destination MAC address


    正确答案: B,A
    解析: 暂无解析

  • 第8题:

    单选题
    An authentication request for a PPP over ATM client has been returned to the router with an address of 255.255.255.254. What does this indicate to the router?()
    A

    A static IP address is used.

    B

    An unnumbered address is used.

    C

    The returned RADIUS address is used.

    D

    The IP address-pool configuration is used.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    多选题
    Which three objects represent pools used in Mobile Service Profiles in the Cisco UCS?()
    A

    WWN

    B

    VSAN

    C

    UUID

    D

    MAC

    E

    VU/N


    正确答案: C,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which three static objects are cached by the client-side WXC device?() (Choose three.)
    A

    XML

    B

    HTML

    C

    JPEG

    D

    JavaScripts

    E

    Cascading Style Sheets


    正确答案: C,D
    解析: 暂无解析

  • 第11题:

    多选题
    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
    A

    zone objects

    B

    policy objects

    C

    attack objects

    D

    alert and notify objects

    E

    network and address objects


    正确答案: E,D
    解析: 暂无解析

  • 第12题:

    多选题
    Which three options represent IDP policy match conditions? ()(Choose three.)
    A

    service

    B

    to-zone

    C

    attacks

    D

    port

    E

    destination-address


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    What is a redundancy group in JUNOS Software?()

    • A、a set of chassis clusters that fail over as a group
    • B、a set of devices that participate in a chassis cluster
    • C、a set of VRRP neighbors that fail over as a group
    • D、a set of chassis cluster objects that fail over as a group

    正确答案:D

  • 第14题:

    Given that Thing is a class, how many objects and reference variables are created by the following code?()   Thing item, stuff;   item = new Thing();   Thing entity = new Thing();

    • A、One object is created
    • B、Two objects are created
    • C、Three objects are created
    • D、One reference variable is created
    • E、Two reference variables are created
    • F、Three reference variables are created.

    正确答案:B,F

  • 第15题:

    Which three objects represent pools used in Mobile Service Profiles in the Cisco UCS?()

    • A、WWN
    • B、VSAN
    • C、UUID
    • D、MAC
    • E、VU/N

    正确答案:A,C,D

  • 第16题:

    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

    • A、zone objects
    • B、policy objects
    • C、attack objects
    • D、alert and notify objects
    • E、network and address objects

    正确答案:A,C,E

  • 第17题:

    Which two statements are true regarding IDP?()

    • A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
    • B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
    • C、IDP inspects traffic up to the Presentation layer.
    • D、IDP inspects traffic up to the Application layer.

    正确答案:A,D

  • 第18题:

    多选题
    Which three objects can be components of a menu module?()
    A

    windows

    B

    parameters

    C

    object groups

    D

    report objects

    E

    visual attributes


    正确答案: C,D
    解析: 暂无解析

  • 第19题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: A,C
    解析: 暂无解析

  • 第20题:

    多选题
    What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()
    A

    default gateway

    B

    DNS servers

    C

    FTP server

    D

    helper address

    E

    subnet mask

    F

    TFTP server


    正确答案: B,F
    解析: 暂无解析

  • 第21题:

    多选题
    What are three configuration objects used to build JUNOS IDP rules?()
    A

    zone objects

    B

    policy objects

    C

    attack objects

    D

    alert and notify objects

    E

    network and address objects


    正确答案: E,B
    解析: 暂无解析

  • 第22题:

    多选题
    You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()
    A

    activating a JUNOS Software commit script

    B

    configuring an IDP groups statement

    C

    setting up a chassis cluster

    D

    downloading the IDP policy templates

    E

    installing the policy templates


    正确答案: E,C
    解析: 暂无解析

  • 第23题:

    多选题
    Which three objects are components of a menu module?()
    A

    Menus

    B

    Canvases

    C

    Object libraries

    D

    Visual attributes

    E

    Attached libraries


    正确答案: C,E
    解析: 暂无解析

  • 第24题:

    单选题
    What is a redundancy group in JUNOS Software?()
    A

    a set of chassis clusters that fail over as a group

    B

    a set of devices that participate in a chassis cluster

    C

    a set of VRRP neighbors that fail over as a group

    D

    a set of chassis cluster objects that fail over as a group


    正确答案: A
    解析: 暂无解析