网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()
A

close-connection

B

terminate-connection

C

close-client-and-server

D

terminate-session


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A close-connectionB terminate-connectionC close-client-and-serverD terminate-session” 相关考题
考题 Which three represent IDP policy match conditions? ()(Choose three.) A.protocolB.source-addressC.portD.applicationE.attacks

考题 Which IDP policy action closes the connection and sends an RST packet to both the client and the server?() A. close-connectionB. terminate-connectionC. close-client-and-serverD. terminate-session

考题 Which action does a BGP speaker take when it detects that the reset state bit is set in an openmessage?() A. It tears down the BGP session.B. It sends a restart message to the peer.C. It marks all routes from that peer as stale.D. It sends a BGP refresh message to the peer

考题 Which action does the ping 172.18.1.1 size 5 command perform?() A. It sends only five ping requests to the 172.18.1.1 destination.B. It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C. It sends five rapid ping requests to the 172.18.1.1 destination.D. It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

考题 Which action does the ping 172.18.1.1 size 5 command perform?()A、It sends only five ping requests to the 172.18.1.1 destination.B、It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C、It sends five rapid ping requests to the 172.18.1.1 destination.D、It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

考题 Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevantB、The action is specified in a then statementC、Ters are optional in a policyD、The match condition can be identified with a from statementE、Every policy must contain at least one term

考题 Which three options represent IDP policy match conditions?()A、protocolB、source-addressC、portD、applicationE、attacks

考题 Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A、close-connectionB、terminate-connectionC、close-client-and-serverD、terminate-session

考题 Which three options represent IDP policy match conditions? ()(Choose three.)A、serviceB、to-zoneC、attacksD、portE、destination-address

考题 Which three statements are true regarding IDP?()A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP inspects traffic up to the Application layer.C、IDP searches the data stream for specific attack patterns.D、IDP inspects traffic up to the Presentation layer.E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

考题 Which statement regarding the implementation of an IDP policy template is true?()A、IDP policy templates are automatically installed as the active IDP policy.B、IDP policy templates are enabled using a commit script.C、IDP policy templates can be downloaded without an IDP license.D、IDP policy templates are included in the factory-default configuration.

考题 You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()A、activating a JUNOS Software commit scriptB、configuring an IDP groups statementC、setting up a chassis clusterD、downloading the IDP policy templatesE、installing the policy templates

考题 Which two statements are true regarding IDP?()A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.C、IDP inspects traffic up to the Presentation layer.D、IDP inspects traffic up to the Application layer.

考题 Which action does a BGP speaker take when it detects that the reset state bit is set in an openmessage?()A、It tears down the BGP session.B、It sends a restart message to the peer.C、It marks all routes from that peer as stale.D、It sends a BGP refresh message to the peer

考题 Which statement is true regarding the retention policy for the incidents accumulated in the AutomaticDiagnostic Repository (ADR)?()A、The incident metadata is purged when the problem is resolved and the DBA closes the SRB、The incident files and dumps are not retained in the ADR for the manually created incidentsC、The incident files are retained but the incident metadata is purged when the problem is resolved and the DBA closes the SRD、The default setting is for one year after which the incident metadata is purged from the ADR and the files are retained for one month

考题 Which statement is true about FLUSH LOGS command?()A、It requires the RELOAD, FILE, and DROP privilegesB、It closes and reopens all log filesC、It closes and sends binary log files to slave serversD、It flushes dirty pages in the buffer pool to the REDO logs

考题 单选题Which statement is true regarding the retention policy for the incidents accumulated in the Automatic Diagnostic Repository (ADR)?()A  The incident metadata is purged when the problem is resolved and the DBA closes the SRB  The incident files and dumps are not retained in the ADR for the manually created incidents C  The incident files are retained but the incident metadata is purged when the problem is resolved and the DBA closes the SRD  The default setting is for one year after which the incident metadata is purged from the ADR and the files are retained for one month

考题 多选题Which three options represent IDP policy match conditions?()AprotocolBsource-addressCportDapplicationEattacks

考题 单选题Which statement is true about FLUSH LOGS command?()A It requires the RELOAD, FILE, and DROP privilegesB It closes and reopens all log filesC It closes and sends binary log files to slave serversD It flushes dirty pages in the buffer pool to the REDO logs

考题 多选题When an LNS sends a Start Control Connection Reply to a LAC,which three parameters can be conveyed?()Ahost nameBTunnel IDCIP addressDDHCP replyEL2TP version

考题 多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevantBThe action is specified in a then statementCTers are optional in a policyDThe match condition can be identified with a from statementEEvery policy must contain at least one term

考题 单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A close-connectionB terminate-connectionC close-client-and-serverD terminate-session

考题 多选题You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()Aactivating a JUNOS Software commit scriptBconfiguring an IDP groups statementCsetting up a chassis clusterDdownloading the IDP policy templatesEinstalling the policy templates

考题 单选题Which statement is true regarding the retention policy for the incidents accumulated in the AutomaticDiagnostic Repository (ADR)?()A The incident metadata is purged when the problem is resolved and the DBA closes the SRB The incident files and dumps are not retained in the ADR for the manually created incidentsC The incident files are retained but the incident metadata is purged when the problem is resolved and the DBA closes the SRD The default setting is for one year after which the incident metadata is purged from the ADR and the files are retained for one month

考题 多选题Which three options represent IDP policy match conditions? ()(Choose three.)AserviceBto-zoneCattacksDportEdestination-address

考题 单选题Which action does the ping 172.18.1.1 size 5 command perform?()A It sends only five ping requests to the 172.18.1.1 destination.B It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C It sends five rapid ping requests to the 172.18.1.1 destination.D It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

考题 单选题Which statement regarding the implementation of an IDP policy template is true?()A IDP policy templates are automatically installed as the active IDP policy.B IDP policy templates are enabled using a commit script.C IDP policy templates can be downloaded without an IDP license.D IDP policy templates are included in the factory-default configuration.

考题 多选题Which three represent IDP policy match conditions? ()(Choose three.)AprotocolBsource-addressCportDapplicationEattacks