网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which zone type can be specified in a policy?()
A

security

B

functional

C

user

D

system


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which zone type can be specified in a policy?()A securityB functionalC userD system” 相关考题
考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

考题 Which zone type can be specified in a policy?() A.securityB.functionalC.userD.system

考题 Which zone is system-defined?() A.securityB.functionalC.junos-globalD.management

考题 Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface

考题 A network vulnerability scanner is part of which critical element of network and system security?() A. host securityB. perimeter securityC. security monitoringD. policy management

考题 Which of the following is NOT a security feature relating to user accounts?()A、Some commands can be password protected requiring logged in customers to re-enter their password.B、A user account can be disabled automatically, after a specified number of invalid login attempts.C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E、Logged in customers can be logged off of the system after a specified period of inactivity.

考题 Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevantB、The action is specified in a then statementC、Ters are optional in a policyD、The match condition can be identified with a from statementE、Every policy must contain at least one term

考题 A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management

考题 Which command will allow you to display the configured QoS group and the ingress buffer allocated to each QoS group?()A、 show interface priority-flow-controlB、 show interface queuingC、 show queuing interfaceD、 show policy-map system type queuingE、 show policy-map interface ethernet  type queuing

考题 Users can define policy to control traffic flow between which two components?()A、from a zone to the device itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

考题 Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevant.B、The action is specified in a then statement.C、Terms are optional in a policy.D、The match condition can be identified with a from statement.E、A from statement is mandatory in a term.

考题 Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

考题 Which zone type can be specified in a policy?()A、securityB、functionalC、userD、system

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

考题 Regarding zone types, which statement is true?()A、You cannot assign an interface to a functional zone.B、You can specifiy a functional zone in a security policy.C、Security zones must have a scheduler applied.D、You can use a security zone for traffic destined for the device itself.

考题 Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()A、Policy violations are prioritized as High, Medium, or Informational by category B、Policies can be disabled completely, or flagged as ignored, for the specified target C、Policies can be flagged as ignored, but never completely disabled, for the specified targetD、Policy violations must be corrected, otherwise the database will shut down until corrective action occurs

考题 Which three statements are true regarding the data types in Oracle Database 10g/11g?()A、Only one LONG column can be used per table B、A TIMESTAMP data type column stores only time values with fractional seconds C、The BLOB data type column is used to store binary data in an operating system file D、The minimum column width that can be specified for a VARCHAR2 data type column is one E、The value for a CHAR data type column is blank-padded to the maximum defined column width

考题 单选题Which of the following is NOT a security feature relating to user accounts?()A Some commands can be password protected requiring logged in customers to re-enter their password.B A user account can be disabled automatically, after a specified number of invalid login attempts.C An account can have multiple valid passwords at the same time, any of which can be used to access the account.D The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E Logged in customers can be logged off of the system after a specified period of inactivity.

考题 多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevantBThe action is specified in a then statementCTers are optional in a policyDThe match condition can be identified with a from statementEEvery policy must contain at least one term

考题 多选题Which three statements are true regarding the data types in Oracle Database 10g/11g?()AOnly one LONG column can be used per tableBA TIMESTAMP data type column stores only time values with fractional secondsCThe BLOB data type column is used to store binary data in an operating system fileDThe minimum column width that can be specified for a VARCHAR2 data type column is oneEThe value for a CHAR data type column is blank-padded to the maximum defined column width

考题 多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevant.BThe action is specified in a then statement.CTerms are optional in a policy.DThe match condition can be identified with a from statement.EA from statement is mandatory in a term.

考题 单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system the system is running.C It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D It creates a ping of death and can cause the entire network to be infected with a virus.

考题 单选题A network vulnerability scanner is part of which critical element of network and system security?()A  host securityB  perimeter securityC  security monitoringD  policy management

考题 单选题Regarding zone types, which statement is true?()A You cannot assign an interface to a functional zone.B You can specifiy a functional zone in a security policy.C Security zones must have a scheduler applied.D You can use a security zone for traffic destined for the device itself.

考题 单选题Which zone type can be specified in a policy?()A securityB functionalC userD system

考题 单选题Which type of zone is used by traffic transiting the device?()A transit zoneB default zoneC security zoneD functional zone

考题 单选题Which zone is a system-defined zone?()A null zoneB trust zoneC untrust zoneD management zone

考题 单选题Which command will allow you to display the configured QoS group and the ingress buffer allocated to each QoS group?()A  show interface priority-flow-controlB  show interface queuingC  show queuing interfaceD  show policy-map system type queuingE  show policy-map interface ethernet  type queuing