网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which zone is system-defined?()
A
security
B
functional
C
junos-global
D
management
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which zone is system-defined?()A securityB functionalC junos-globalD management” 相关考题
考题
Which of the following organizations has the best technical project control?A . matrixB . functionalC . projectizedD . B and CE . A and B
考题
The _____ specification delineates specific end use capabilities which can be tested in the acceptance procedure.A performanceB functionalC technicalD base lineE operational
考题
42 Which of the following organizations has the best technical project control?A. matrixB. functionalC. projectizedD. B and CE. A and B
考题
You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()
A. set security zones management interfaces ge-0/0/0.0B. set zones functional-zone management interfaces ge-0/0/0.0C. set security zones functional-zone management interfaces ge-0/0/0.0D. set security zones functional-zone out-of-band interfaces ge-0/0/0.0
考题
You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A. [edit security policies from-zone HR to-zone HR]B. [edit security zones functional-zone management protocols]C. [edit security zones protocol-zone HR host-inbound-traffic]D. [edit security zones security-zone HR host-inbound-traffic protocols]
考题
Click the Exhibit button.Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2.Which is a potential cause for this problem?()
A. The untrust zone does not have a management policy configured.B. The trust zone does not have ping enabled as host-inbound-traffic service.C. The security policy from the trust zone to the untrust zone does not permit ping.D. No security policy exists for the ICMP reply packet from the untrust zone to the trust zone.
考题
A network vulnerability scanner is part of which critical element of network and system security?()
A. host securityB. perimeter securityC. security monitoringD. policy management
考题
()logistics is the management by computer and Extranet.A、ElectronicB、FunctionalC、VirtualD、Physical
考题
A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management
考题
What are two functions that WLAN management provides? ()A、 enhances securityB、 system testsC、 accommodates additional routersD、 simplifies daily operationsE、 uses standalone access points
考题
You want to allow your device to establish OSPF adjacencies with a neighboring device connected tointerface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A、[edit security policies from-zone HR to-zone HR]B、[edit security zones functional-zone management protocols]C、[edit security zones protocol-zone HR host-inbound-traffic]D、[edit security zones security-zone HR host-inbound-traffic protocols]
考题
What is the purpose of a zone in JUNOS Software?()A、A zone defines a group of security devices with a common management.B、A zone defines the geographic region in which the security device is deployed.C、A zone defines a group of network segments with similar security requirements.D、A zone defines a group of network segments with similar class-of-service requirements.
考题
Which zone is a system-defined zone?()A、null zoneB、trust zoneC、untrust zoneD、management zone
考题
Which two statements are true for a security policy? ()(Choose two.)A、It controls inter-zone traffic.B、It controls intra-zone traffic.C、It is named with a system-defined name.D、It controls traffic destined to the device's ingress interface.
考题
You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A、set security zones management interfaces ge-0/0/0.0B、set zones functional-zone management interfaces ge-0/0/0.0C、set security zones functional-zone management interfaces ge-0/0/0.0D、set security zones functional-zone out-of-band interfaces ge-0/0/0.0
考题
多选题Which two statements are true for a security policy? ()(Choose two.)AIt controls inter-zone traffic.BIt controls intra-zone traffic.CIt is named with a system-defined name.DIt controls traffic destined to the device's ingress interface.
考题
单选题You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A
set security zones management interfaces ge-0/0/0.0B
set zones functional-zone management interfaces ge-0/0/0.0C
set security zones functional-zone management interfaces ge-0/0/0.0D
set security zones functional-zone out-of-band interfaces ge-0/0/0.0
考题
单选题Click the Exhibit button. Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2. Which is a potential cause for this problem?()A
The untrust zone does not have a management policy configured.B
The trust zone does not have ping enabled as host-inbound-traffic service.C
The security policy from the trust zone to the untrust zone does not permit ping.D
No security policy exists for the ICMP reply packet from the untrust zone to the trust zone.
考题
单选题You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A
[edit security policies from-zone HR to-zone HR]B
[edit security zones functional-zone management protocols]C
[edit security zones protocol-zone HR host-inbound-traffic]D
[edit security zones security-zone HR host-inbound-traffic protocols]
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题Which type of zone is used by traffic transiting the device?()A
transit zoneB
default zoneC
security zoneD
functional zone
考题
单选题Which zone is a system-defined zone?()A
null zoneB
trust zoneC
untrust zoneD
management zone
考题
单选题What is the purpose of a zone in JUNOS Software?()A
A zone defines a group of security devices with a common management.B
A zone defines the geographic region in which the security device is deployed.C
A zone defines a group of network segments with similar security requirements.D
A zone defines a group of network segments with similar class-of-service requirements.
热门标签
最新试卷