更多“多选题Which three options represent IDP policy match conditions?()AprotocolBsource-addressCportDapplicationEattacks”相关问题
  • 第1题:

    Which three options represent IDP policy match conditions?()

    • A、protocol
    • B、source-address
    • C、port
    • D、application
    • E、attacks

    正确答案:B,D,E

  • 第2题:

    Which three statements are true regarding IDP?()

    • A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
    • B、IDP inspects traffic up to the Application layer.
    • C、IDP searches the data stream for specific attack patterns.
    • D、IDP inspects traffic up to the Presentation layer.
    • E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

    正确答案:B,C,E

  • 第3题:

    You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()

    • A、activating a JUNOS Software commit script
    • B、configuring an IDP groups statement
    • C、setting up a chassis cluster
    • D、downloading the IDP policy templates
    • E、installing the policy templates

    正确答案:A,D,E

  • 第4题:

    Which three statements are true about terms in a policy?()

    • A、The order of the terms in a policy is irrelevant.
    • B、The action is specified in a then statement.
    • C、Terms are optional in a policy.
    • D、The match condition can be identified with a from statement.
    • E、A from statement is mandatory in a term.

    正确答案:B,C,D

  • 第5题:

    Which two statements are true regarding IDP?()

    • A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
    • B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
    • C、IDP inspects traffic up to the Presentation layer.
    • D、IDP inspects traffic up to the Application layer.

    正确答案:A,D

  • 第6题:

    Which three are considered match criteria in a policy?()

    • A、prefix-list
    • B、protocol ospf
    • C、next-term
    • D、AS path
    • E、prefix-term

    正确答案:A,B,D

  • 第7题:

    多选题
    Which three advanced permit actions within security policies are valid?()
    A

    Mark permitted traffic for firewall user authentication.

    B

    Mark permitted traffic for SCREEN options.

    C

    Associate permitted traffic with an IPsec tunnel.

    D

    Associate permitted traffic with a NAT rule.

    E

    Mark permitted traffic for IDP processing.


    正确答案: C,E
    解析: 暂无解析

  • 第8题:

    多选题
    You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()
    A

    activating a JUNOS Software commit script

    B

    configuring an IDP groups statement

    C

    setting up a chassis cluster

    D

    downloading the IDP policy templates

    E

    installing the policy templates


    正确答案: E,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors?()
    A

    set protocols rip export demo

    B

    edit policy-options policy-statement demo set term 1 from protocol static set term 1 then accept

    C

    edit policy-options policy-statement demo set term 1 from protocol static

    D

    set policy-options policy-statement demo


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which three options represent IDP policy match conditions? ()(Choose three.)
    A

    service

    B

    to-zone

    C

    attacks

    D

    port

    E

    destination-address


    正确答案: A,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which three represent IDP policy match conditions? ()(Choose three.)
    A

    protocol

    B

    source-address

    C

    port

    D

    application

    E

    attacks


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which three options represent IDP policy match conditions?()
    A

    protocol

    B

    source-address

    C

    port

    D

    application

    E

    attacks


    正确答案: A,B
    解析: 暂无解析

  • 第13题:

    Which three options represent IDP policy match conditions? ()(Choose three.)

    • A、service
    • B、to-zone
    • C、attacks
    • D、port
    • E、destination-address

    正确答案:B,C,E

  • 第14题:

    Which statement regarding the implementation of an IDP policy template is true?()

    • A、IDP policy templates are automatically installed as the active IDP policy.
    • B、IDP policy templates are enabled using a commit script.
    • C、IDP policy templates can be downloaded without an IDP license.
    • D、IDP policy templates are included in the factory-default configuration.

    正确答案:B

  • 第15题:

    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

    • A、zone objects
    • B、policy objects
    • C、attack objects
    • D、alert and notify objects
    • E、network and address objects

    正确答案:A,C,E

  • 第16题:

    Which three advanced permit actions within security policies are valid?() (Choose three.)

    • A、Mark permitted traffic for firewall user authentication.
    • B、Mark permitted traffic for SCREEN options.
    • C、Associate permitted traffic with an IPsec tunnel.
    • D、Associate permitted traffic with a NAT rule.
    • E、Mark permitted traffic for IDP processing.

    正确答案:A,C,E

  • 第17题:

    Which three represent IDP policy match conditions? ()(Choose three.)

    • A、protocol
    • B、source-address
    • C、port
    • D、application
    • E、attacks

    正确答案:B,D,E

  • 第18题:

    多选题
    Which three are considered match criteria in a policy?()
    A

    prefix-list

    B

    protocol ospf

    C

    next-term

    D

    AS path

    E

    prefix-term


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    多选题
    Which three statements are true about terms in a policy?()
    A

    The order of the terms in a policy is irrelevant

    B

    The action is specified in a then statement

    C

    Ters are optional in a policy

    D

    The match condition can be identified with a from statement

    E

    Every policy must contain at least one term


    正确答案: C,D
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true regarding IDP?()
    A

    IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.

    C

    IDP inspects traffic up to the Presentation layer.

    D

    IDP inspects traffic up to the Application layer.


    正确答案: A,B
    解析: 暂无解析

  • 第21题:

    多选题
    Which three statements are true about terms in a policy?()
    A

    The order of the terms in a policy is irrelevant.

    B

    The action is specified in a then statement.

    C

    Terms are optional in a policy.

    D

    The match condition can be identified with a from statement.

    E

    A from statement is mandatory in a term.


    正确答案: B,E
    解析: 暂无解析

  • 第22题:

    单选题
    Which statement regarding the implementation of an IDP policy template is true?()
    A

    IDP policy templates are automatically installed as the active IDP policy.

    B

    IDP policy templates are enabled using a commit script.

    C

    IDP policy templates can be downloaded without an IDP license.

    D

    IDP policy templates are included in the factory-default configuration.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which three advanced permit actions within security policies are valid?() (Choose three.)
    A

    Mark permitted traffic for firewall user authentication.

    B

    Mark permitted traffic for SCREEN options.

    C

    Associate permitted traffic with an IPsec tunnel.

    D

    Associate permitted traffic with a NAT rule.

    E

    Mark permitted traffic for IDP processing.


    正确答案: B,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which three statements are true regarding IDP?()
    A

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP inspects traffic up to the Application layer.

    C

    IDP searches the data stream for specific attack patterns.

    D

    IDP inspects traffic up to the Presentation layer.

    E

    IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.


    正确答案: D,C
    解析: 暂无解析