网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which security or functional zone name has special significance to the Junos OS?()
A

self

B

trust

C

untrust

D

junos-global


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which security or functional zone name has special significance to the Junos OS?()A selfB trustC untrustD junos-global” 相关考题
考题 In the Junos OS, which statement is true?() A. vlan.0 belongs to the untrust zone.B. You must configure Web authentication to allow inbound traffic in the untrust zone.C. The zone name untrust has no special meaning.D. The untrust zone is not configurable.

考题 You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?() A. set security zones management interfaces ge-0/0/0.0B. set zones functional-zone management interfaces ge-0/0/0.0C. set security zones functional-zone management interfaces ge-0/0/0.0D. set security zones functional-zone out-of-band interfaces ge-0/0/0.0

考题 Which zone type will allow transit-traffic?() A.systemB.securityC.defaultD.functional

考题 Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

考题 Which security or functional zone name has special significance to the Junos OS?() A. selfB. trustC. untrustD. junos-global

考题 Which type of zone is used by traffic transiting the device?()A、transit zoneB、default zoneC、security zoneD、functional zone

考题 You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A、[edit security policies from-zone HR to-zone HR]B、[edit security zones functional-zone management protocols]C、[edit security zones protocol-zone HR host-inbound-traffic]D、[edit security zones security-zone HR host-inbound-traffic protocols]

考题 A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A、The website has updated the security policies.B、The user’s identity has been stolen.C、The browser has been hijacked.D、The user typed the website address incorrectly.

考题 When choosing a hostname, which of the following naming conventions is most important to consider?()A、The name is unique globallyB、The name is unique in a specified domainC、The name is not named after a person, place or thingD、The name has special meaning to the machine’s function

考题 Which zone type will allow transit-traffic?()A、systemB、securityC、defaultD、functional

考题 In the Junos OS, which statement is true?()A、vlan.0 belongs to the untrust zone.B、You must configure Web authentication to allow inbound traffic in the untrust zone.C、The zone name "untrust" has no special meaning.D、The untrust zone is not configurable.

考题 What is the purpose of a zone in JUNOS Software?()A、A zone defines a group of security devices with a common management.B、A zone defines the geographic region in which the security device is deployed.C、A zone defines a group of network segments with similar security requirements.D、A zone defines a group of network segments with similar class-of-service requirements.

考题 Which two statements are true for a security policy? ()(Choose two.)A、It controls inter-zone traffic.B、It controls intra-zone traffic.C、It is named with a system-defined name.D、It controls traffic destined to the device's ingress interface.

考题 Regarding zone types, which statement is true?()A、You cannot assign an interface to a functional zone.B、You can specifiy a functional zone in a security policy.C、Security zones must have a scheduler applied.D、You can use a security zone for traffic destined for the device itself.

考题 Your  company,  A.  Datum  Corporation,  has  a  single  Active  Directory  domain  named  intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2  operating system. The domain controllers also run DNS servers.  The intranet.adatum.com DNS zone is configured as an Active Directoryintegrated zone with the  Dynamic updates setting configured to Secure only.  A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by  domain controllers or member servers.  You need to configure the intranet.adatum.com zone to meet the new security policy requirement.  Which two actions should you perform()A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone  properties.B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com  DNS zone properties.C、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab  of the intranet.adatum.com DNS zone properties.D、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security  tab of the intranet.adatum.com DNS zone properties.

考题 单选题When choosing a hostname, which of the following naming conventions is most important to consider?()A The name is unique globallyB The name is unique in a specified domainC The name is not named after a person, place or thingD The name has special meaning to the machine’s function

考题 单选题Which security or functional zone name has special significance to the Junos OS?()A selfB trustC untrustD junos-global

考题 单选题Which statement describes a security zone?()A A security zone can contain one or more interfaces.B A security zone can contain interfaces in multiple routing instances.C A security zone must contain two or more interfaces.D A security zone must contain bridge groups.

考题 单选题A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A The website has updated the security policies.B The user’s identity has been stolen.C The browser has been hijacked.D The user typed the website address incorrectly.

考题 多选题Which two statements are true for a security policy? ()(Choose two.)AIt controls inter-zone traffic.BIt controls intra-zone traffic.CIt is named with a system-defined name.DIt controls traffic destined to the device's ingress interface.

考题 单选题You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

考题 单选题In the Junos OS, which statement is true?()A vlan.0 belongs to the untrust zone.B You must configure Web authentication to allow inbound traffic in the untrust zone.C The zone name untrust has no special meaning.D The untrust zone is not configurable.

考题 多选题Which two steps are performed when configuring a zone?()ADefine a default policy for the zone.BAssign logical interfaces to the zone.CAssign physical interfaces to the zone.DDefine the zone as a security or functional zone

考题 单选题Which configuration shows the correct application of a security policy scheduler?()A [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } scheduler-name now; } } }B [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }C [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn scheduler-name now; } } } }D [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; scheduler-name now; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }myTunnel;

考题 单选题What is the purpose of a zone in JUNOS Software?()A A zone defines a group of security devices with a common management.B A zone defines the geographic region in which the security device is deployed.C A zone defines a group of network segments with similar security requirements.D A zone defines a group of network segments with similar class-of-service requirements.

考题 单选题Regarding zone types, which statement is true?()A You cannot assign an interface to a functional zone.B You can specifiy a functional zone in a security policy.C Security zones must have a scheduler applied.D You can use a security zone for traffic destined for the device itself.

考题 单选题You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A [edit security policies from-zone HR to-zone HR]B [edit security zones functional-zone management protocols]C [edit security zones protocol-zone HR host-inbound-traffic]D [edit security zones security-zone HR host-inbound-traffic protocols]

考题 单选题You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A set security zones management interfaces ge-0/0/0.0B set zones functional-zone management interfaces ge-0/0/0.0C set security zones functional-zone management interfaces ge-0/0/0.0D set security zones functional-zone out-of-band interfaces ge-0/0/0.0