protocol
source-address
port
application
attacks
第1题:
Which three options represent IDP policy match conditions?()
第2题:
Which three statements are true regarding IDP?()
第3题:
You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()
第4题:
Which three statements are true about terms in a policy?()
第5题:
Which two statements are true regarding IDP?()
第6题:
Which three are considered match criteria in a policy?()
第7题:
Mark permitted traffic for firewall user authentication.
Mark permitted traffic for SCREEN options.
Associate permitted traffic with an IPsec tunnel.
Associate permitted traffic with a NAT rule.
Mark permitted traffic for IDP processing.
第8题:
activating a JUNOS Software commit script
configuring an IDP groups statement
setting up a chassis cluster
downloading the IDP policy templates
installing the policy templates
第9题:
set protocols rip export demo
edit policy-options policy-statement demo set term 1 from protocol static set term 1 then accept
edit policy-options policy-statement demo set term 1 from protocol static
set policy-options policy-statement demo
第10题:
service
to-zone
attacks
port
destination-address
第11题:
protocol
source-address
port
application
attacks
第12题:
protocol
source-address
port
application
attacks
第13题:
Which three options represent IDP policy match conditions? ()(Choose three.)
第14题:
Which statement regarding the implementation of an IDP policy template is true?()
第15题:
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
第16题:
Which three advanced permit actions within security policies are valid?() (Choose three.)
第17题:
Which three represent IDP policy match conditions? ()(Choose three.)
第18题:
prefix-list
protocol ospf
next-term
AS path
prefix-term
第19题:
The order of the terms in a policy is irrelevant
The action is specified in a then statement
Ters are optional in a policy
The match condition can be identified with a from statement
Every policy must contain at least one term
第20题:
IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
IDP inspects traffic up to the Presentation layer.
IDP inspects traffic up to the Application layer.
第21题:
The order of the terms in a policy is irrelevant.
The action is specified in a then statement.
Terms are optional in a policy.
The match condition can be identified with a from statement.
A from statement is mandatory in a term.
第22题:
IDP policy templates are automatically installed as the active IDP policy.
IDP policy templates are enabled using a commit script.
IDP policy templates can be downloaded without an IDP license.
IDP policy templates are included in the factory-default configuration.
第23题:
Mark permitted traffic for firewall user authentication.
Mark permitted traffic for SCREEN options.
Associate permitted traffic with an IPsec tunnel.
Associate permitted traffic with a NAT rule.
Mark permitted traffic for IDP processing.
第24题:
IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
IDP inspects traffic up to the Application layer.
IDP searches the data stream for specific attack patterns.
IDP inspects traffic up to the Presentation layer.
IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.