网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which statement describes the behavior of a security policy?()
A

The implicit default security policy permits all traffic.

B

Traffic destined to the device itself always requires a security policy.

C

Traffic destined to the device’s incoming interface does not require a security policy.

D

The factory-default configuration permits all traffic from all interfaces.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which statement describes the behavior of a security policy?()A The implicit default security policy permits all traffic.B Traffic destined to the device itself always requires a security policy.C Traffic destined to the device’s incoming interface does not require a security policy.D The factory-default configuration permits all traffic from all interfaces.” 相关考题
考题 Which statement is true about terms in a policy?() A. A single term can be applied to a protocol or interface, independent of the policy.B. Once configured, terms within a policy cannot be reordered.C. The name of a term is limited to five characters.D. A from statement is optional in a term.

考题 Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

考题 Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?() A. policy-rematchB. policy-evaluateC. rematch-policyD. evaluate-policy

考题 Which statement is correct about a Routing Policy term?() A.A term must contain a from statement.B.A term acts like if and then statements.C.The most specific term has precedence.D.Terms can be written in any order to achieve the same behavior.

考题 Which statement best describes Cisco IOS Zone-Based Policy Firewall?()A、A router interface can belong to multiple zones.B、Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.C、The pass action works in only one directionD、A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.

考题 Which statement is true about terms in a policy?()A、A single term can be applied to a protocol or interface, independent of the policy.B、Once configured, terms within a policy cannot be reordered.C、The name of a term is limited to five characters.D、A from statement is optional in a term.

考题 Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

考题 Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?()A、policy-rematchB、policy-evaluateC、rematch-policyD、evaluate-policy

考题 Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevant.B、The action is specified in a then statement.C、Terms are optional in a policy.D、The match condition can be identified with a from statement.E、A from statement is mandatory in a term.

考题 Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

考题 A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management

考题 As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()A、Create a design specification document.B、Integrate routing and switching components.C、Document power and UPS availabilityD、Document the customer's current and future technology projects.

考题 When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()A、Third-party due diligence policy reviewB、Remote Access PolicyC、Encryption PolicyD、Application change control policyE、Security Personnel policy

考题 Which statement is correct about a Routing Policy term?()A、A term must contain a "from" statement.B、A term acts like "if" and "then" statements.C、The most specific term has precedence.D、Terms can be written in any order to achieve the same behavior.

考题 Which statement is true about source NAT?()A、Source NAT works only with source pools.B、Destination NAT is required to translate the reply traffic.C、Source NAT does not require a security policy to function.D、The egress interface IP address can be used for source NAT

考题 Regarding zone types, which statement is true?()A、You cannot assign an interface to a functional zone.B、You can specifiy a functional zone in a security policy.C、Security zones must have a scheduler applied.D、You can use a security zone for traffic destined for the device itself.

考题 The ERX Edge Router can utilize which two classifiers?()A、multi fieldB、policy classifierC、quality of serviceD、behavior aggregate

考题 多选题When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()AThird-party due diligence policy reviewBRemote Access PolicyCEncryption PolicyDApplication change control policyESecurity Personnel policy

考题 单选题Which statement describes a security zone?()A A security zone can contain one or more interfaces.B A security zone can contain interfaces in multiple routing instances.C A security zone must contain two or more interfaces.D A security zone must contain bridge groups.

考题 多选题Which two security policy actions are valid?()AdenyBdiscardCrejectDclose

考题 单选题A network vulnerability scanner is part of which critical element of network and system security?()A  host securityB  perimeter securityC  security monitoringD  policy management

考题 单选题Which statement is true about source NAT?()A Source NAT works only with source pools.B Destination NAT is required to translate the reply traffic.C Source NAT does not require a security policy to function.D The egress interface IP address can be used for source NAT

考题 单选题Which statement accurately describes firewall user authentication?()A Firewall user authentication provides another layer of security in a network.B Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C Firewall user authentication enables session-based forwarding.D Firewall user authentication is used as a last resort security method in a network.

考题 多选题Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors?()Aset protocols rip export demoBedit policy-options policy-statement demo set term 1 from protocol static set term 1 then acceptCedit policy-options policy-statement demo set term 1 from protocol staticDset policy-options policy-statement demo

考题 单选题Regarding zone types, which statement is true?()A You cannot assign an interface to a functional zone.B You can specifiy a functional zone in a security policy.C Security zones must have a scheduler applied.D You can use a security zone for traffic destined for the device itself.

考题 多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevant.BThe action is specified in a then statement.CTerms are optional in a policy.DThe match condition can be identified with a from statement.EA from statement is mandatory in a term.

考题 单选题Which statement is correct about a Routing Policy term?()A A term must contain a from statement.B A term acts like if and then statements.C The most specific term has precedence.D Terms can be written in any order to achieve the same behavior.