网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

  • A、zone objects
  • B、policy objects
  • C、attack objects
  • D、alert and notify objects
  • E、network and address objects

参考答案

更多 “What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects” 相关考题
考题 Which three options represent IDP policy match conditions? ()(Choose three.) A.serviceB.to-zoneC.attacksD.portE.destination-address

考题 Which three functions are provided by the Junos OS for security platforms?()(Choose three.) A. VPN establishmentB. stateful ARP lookupsC. Dynamic ARP inspectionD. Network Address TranslationE. inspection of packets at higher levels (Layer 4 and above)

考题 What are three configuration objects used to build Junos IDP rules? ()(Choose three.) A. zone objectsB. policy objectsC. attack objectsD. alert and notify objectsE. network and address objects

考题 Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.) A. access profileB. client groupC. clientD. default profileE. external

考题 Which three static objects are cached by the client-side WXC device?() (Choose three.) A. XMLB. HTMLC. JPEGD. JavaScriptsE. Cascading Style Sheets

考题 When using horizontal sextant angles of three objects to fix your position,an indeterminate position will result in which situation ________.A.The objects lie in a straight lineB.The vessel is inside of a triangle formed by the objectsC.The vessel is outside of a triangle formed by the objectsD.A circle will pass through your position and the three objects

考题 What are three valid Juniper Networks IPS attack object types?() (Choose three.)A、signatureB、anomalyC、trojanD、virusE、chain

考题 A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()A、from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C、from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

考题 Which three options represent IDP policy match conditions? ()(Choose three.)A、serviceB、to-zoneC、attacksD、portE、destination-address

考题 Which three statements are true regarding IDP?()A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP inspects traffic up to the Application layer.C、IDP searches the data stream for specific attack patterns.D、IDP inspects traffic up to the Presentation layer.E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

考题 What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address

考题 What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()A、default gatewayB、DNS serversC、FTP serverD、helper addressE、subnet maskF、TFTP server

考题 Which three static objects are cached by the client-side WXC device?() (Choose three.)A、XMLB、HTMLC、JPEGD、JavaScriptsE、Cascading Style Sheets

考题 What are three configuration objects used to build JUNOS IDP rules?()A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

考题 What are three components of the NET address? ()(Choose three.)A、Area IDB、N-selectorC、System IDD、ISO numberE、MAC address

考题 Which three functions are provided by the Junos OS for security platforms?()(Choose three.)A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)

考题 Which three represent IDP policy match conditions? ()(Choose three.)A、protocolB、source-addressC、portD、applicationE、attacks

考题 Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)A、access profileB、client groupC、clientD、default profileE、external

考题 多选题What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。AprotocolBVLAN numberCTCP or UDP port numbersDsource switch port numberEsource IP address and destination IP addressFsource MAC address and destination MAC address

考题 多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal

考题 多选题What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()Adefault gatewayBDNS serversCFTP serverDhelper addressEsubnet maskFTFTP server

考题 多选题What are three configuration objects used to build JUNOS IDP rules?()Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

考题 多选题Which three static objects are cached by the client-side WXC device?() (Choose three.)AXMLBHTMLCJPEGDJavaScriptsECascading Style Sheets

考题 多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

考题 多选题Which three represent IDP policy match conditions? ()(Choose three.)AprotocolBsource-addressCportDapplicationEattacks

考题 多选题What are three components of the NET address? ()(Choose three.)AArea IDBN-selectorCSystem IDDISO numberEMAC address

考题 多选题What are three valid Juniper Networks IPS attack object types?() (Choose three.)AsignatureBanomalyCtrojanDvirusEchain