网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which two security policy actions are valid?()

  • A、deny
  • B、discard
  • C、reject
  • D、close

参考答案

更多 “Which two security policy actions are valid?()A、denyB、discardC、rejectD、close” 相关考题
考题 Click the Exhibit button.What are two valid reasons for the output shown in the exhibit?() (Choose two.) A. The local Web-filtering daemon is not enabled or is not running.B. The integrated Web-filtering policy server is not reachable.C. No DNS is configured on the SRX Series device.D. No security policy is configured to use Web filtering.

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

考题 Which two statements regarding firewall user authentication client groups are true?() (Choose two.) A. A client group is a list of clients associated with a group.B. A client group is a list of groups associated with a client.C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

考题 Whichtwosecuritypolicyactionsarevalid?() A.denyB.discardC.rejectD.close

考题 Which two parameters are configured in IPsec policy? ()(Choose two.) A. modeB. IKE gatewayC. security proposalD. Perfect Forward Secrecy

考题 Which two policy actions are considered flow control actions?() A.rejectB.community addC.next termD.next policy

考题 What are two valid actions for routing policy?() A. discardB. next policyC. acceptD. ignore

考题 Which two statements regarding firewall user authentication client groups are true?() (Choose two.)A、A client group is a list of clients associated with a group.B、A client group is a list of groups associated with a client.C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

考题 Which two actions, when taken in combination, will result in an effective network security solution?()A、 develop a policy for securing the networkB、 monitor and test network activities for vulnerabilitiesC、 implement reflexive access listsD、 implement dynamic access listsE、 select and implement a single comprehensive virus protection program

考题 Which two firewall user authentication objects can be referenced in a security policy?()A、access profileB、client groupC、clientD、default profile

考题 Which two parameters are configured in IPsec policy?()A、modeB、IKE gatewayC、security proposalD、Perfect Forward Secrecy

考题 Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

考题 Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

考题 Which two statements about Cisco Security Management Suite are correct?()A、It should be implemented in a management VLAN.B、Its connection to managed devices should be over a data VLAN.C、It is made up of Cisco Security MARS and Clean Access software.D、It should be deployed as close to the edge of the network as possible.E、It delivers policy administration and enforcement for the Cisco Self-Defending Network.

考题 Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

考题 Which two policy actions are considered flow control actions?()A、rejectB、community addC、next termD、next policy

考题 What are two valid actions for a routing policy?()A、discardB、next policyC、acceptD、ignore

考题 Which two parameters are configured in IPsec policy? ()(Choose two.)A、modeB、IKE gatewayC、security proposalD、Perfect Forward Secrecy

考题 You are creating a destination NAT rule-set. Which two are valid for use with the from clause?()A、security policyB、interfaceC、routing-instanceD、IP address

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

考题 Which two configuration elements are required for a route-based VPN?()A、secure tunnel interfaceB、security policy to permit the IKE trafficC、a route for the tunneled transit trafficD、tunnel policy for transit traffic referencing the IPsec VPN

考题 You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server

考题 You need to configure the security settings for the new app servers. Which two actions should you perform?()A、Create a Group policy object (GPO) for the web servers.B、Create a Group policy object (GPO) for the database servers.C、Modify the Default Domain Policy.D、Modify the Default Domain Controllers Policy.

考题 You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()A、Place all infrastructure servers in subnets that cannot exchange information with the InternetB、Establish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversC、Use Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversD、Edit the local policy settings to configure each individual server

考题 多选题Which two statements about Cisco Security Management Suite are correct?()AIt should be implemented in a management VLAN.BIts connection to managed devices should be over a data VLAN.CIt is made up of Cisco Security MARS and Clean Access software.DIt should be deployed as close to the edge of the network as possible.EIt delivers policy administration and enforcement for the Cisco Self-Defending Network.

考题 多选题Which two actions, when taken in combination, will result in an effective network security solution?()Adevelop a policy for securing the networkBmonitor and test network activities for vulnerabilitiesCimplement reflexive access listsDimplement dynamic access listsEselect and implement a single comprehensive virus protection program

考题 多选题Which two security policy actions are valid?()AdenyBdiscardCrejectDclose