网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
What are three terminating actions for firewall filters?()
A

reject

B

drop

C

permit

D

accept

E

discard


参考答案

参考解析
解析: 暂无解析
更多 “多选题What are three terminating actions for firewall filters?()ArejectBdropCpermitDacceptEdiscard” 相关考题
考题 What are three firewall filter terminating actions?() A. acceptB. logC. rejectD. discardE. drop

考题 Which two statements are correct about firewall filters in the Junos OS?() A. Firewall filters are stateless.B. Firewall filters are used to control routing information that is exchanged between devices.C. Firewall filters are used to control traffic passing through the device.D. Firewall filters can only be applied to traffic entering the device.

考题 What is the default action for firewall filters?() A. acceptB. rejectC. discardD. log

考题 A routing policy has three terms and the first term of the policy does not contain a terminating action. What will become of the routes after they have been evaluated by the first term?() A.In the absence of a terminating action, all routes are accepted.B.The route will be evaluated by the second term in the policy.C.The default action will be applied.D.In the absence of a termination action, all routes are rejected.

考题 What is the recommended practice when considering VPN termination and firewall placement?() A. have the firewall and VPN appliance deployed in parallelB. place the VPN in line with the firewall, with the VPN terminating inside the firewallC. place the public side of the VPN termination device in the DMZ behind a firewallD. place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 What methods are available to create separate multicast and unicast forwarding topologies on a Juniper Networks router?()A、MBGPB、RIB groupsC、Routing policyD、Firewall filters

考题 What are three firewall filter terminating actions?()A、acceptB、logC、rejectD、discardE、drop

考题 A routing policy has three terms and the first term of the policy does not contain a terminating action. What will become of the routes after they have been evaluated by the first term?()A、In the absence of a terminating action, all routes are accepted.B、The route will be evaluated by the second term in the policy.C、The default action will be applied.D、In the absence of a termination action, all routes are rejected.

考题 What is the default action for firewall filters?()A、acceptB、rejectC、discardD、log

考题 What are three applications for firewall filters in JUNOS software?()A、route filteringB、protect the routing engineC、securing the router control planeD、protect against hidden bridge loopsE、protect against denial of service attacks

考题 What are two characteristics of multi-filed classification?()A、Implemented with firewall filters.B、Typically configured on core routers.C、Typically configured on customer facing routers.D、Implemented with Behavior Aggregate (BA) classification.

考题 What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()A、IP addressB、MAC addressC、protocolD、portE、session ID

考题 Firewall filters can perform which two actions?()A、Log packet.B、Count packet.C、Set packet metric.D、Decrement packet TTL.E、Change destination IP address.

考题 What are three terminating actions for firewall filters?()A、rejectB、dropC、permitD、acceptE、discard

考题 Firewall filters can perform which two actions?()A、Log packets.B、Set packet metrics.C、Count packets.D、Decrement packet's TTL value.

考题 多选题What are three features of the Cisco IOS Firewall feature set?()Anetwork-based application recognition (NBAR)Bauthentication proxyCstateful packet filteringDAAA servicesEproxy serverFIPS

考题 多选题What are three firewall filter terminating actions?()AacceptBlogCrejectDdiscardEdrop

考题 多选题What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()AIP addressBMAC addressCprotocolDportEsession ID

考题 多选题Firewall filters can be used to accept, discard, or reject packets based on ()Aprotocol typeBMAC addressCTCP or UDP portDsource and destination IP address

考题 多选题What are three applications for firewall filters in JUNOS software?()Aroute filteringBprotect the routing engineCsecuring the router control planeDprotect against hidden bridge loopsEprotect against denial of service attacks

考题 多选题Which two statements are correct about firewall filters in the Junos OS?()AFirewall filters are stateless.BFirewall filters are used to control routing information that is exchanged between devices.CFirewall filters are used to control traffic passing through the device.DFirewall filters can only be applied to traffic entering the device.

考题 多选题What are two characteristics of multi-filed classification?()AImplemented with firewall filters.BTypically configured on core routers.CTypically configured on customer facing routers.DImplemented with Behavior Aggregate (BA) classification.

考题 单选题What is the recommended practice when considering VPN termination and firewall placement?()A  have the firewall and VPN appliance deployed in parallelB  place the VPN in line with the firewall, with the VPN terminating inside the firewallC  place the public side of the VPN termination device in the DMZ behind a firewallD  place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 多选题What are three terminating actions for firewall filters?()ArejectBdropCpermitDacceptEdiscard

考题 多选题Firewall filters can perform which two actions?()ALog packets.BSet packet metrics.CCount packets.DDecrement packet's TTL value.

考题 多选题Firewall filters can perform which two actions?()ALog packet.BCount packet.CSet packet metric.DDecrement packet TTL.EChange destination IP address.

考题 多选题Which three advanced permit actions within security policies are valid?() (Choose three.)AMark permitted traffic for firewall user authentication.BMark permitted traffic for SCREEN options.CAssociate permitted traffic with an IPsec tunnel.DAssociate permitted traffic with a NAT rule.EMark permitted traffic for IDP processing.