网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
What is a Host Enforcer policy?()

A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.

B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.

C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.

D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.


参考答案

更多 “ What is a Host Enforcer policy?() A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic. ” 相关考题
考题 Click the Exhibit button.Referring to the exhibit, which statement contains the correct gateway parameters?() A. [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }B. [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }C. [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }D. [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

考题 Which statement contains the correct parameters for a route-based IPsec VPN?() A. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }B. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }C. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }D. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

考题 Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?() A. policy-rematchB. policy-evaluateC. rematch-policyD. evaluate-policy

考题 You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN.On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each participating interface, what provides this functionality?()A. guest-vlanB. auth-fail-vlanC. server-reject-vlanD. server-fail-vlan

考题 ABGProuterhasthefollowingconfiguration:protocols{bgp{export[policy-1policy-2policy-3];}}policy-options{policy-statementpolicy-2{termget-statics{fromprotocolstatic;thenaccept;}termreject-all{thenreject;}}policy-statementpolicy-1{termget-aggregate{fromprotocolaggregate;thenaccept;}termreject-all{thenreject;}}policy-statementpolicy-3{termget-ospf{fromprotocolospf;thenaccept;}termreject-all{thenreject;}}}Whichpolicytermisevaluatedfirstwhenexportingroutes?()

考题 Which naming convention is used by Juniper Routers when archiving their configurations to a remote server?() A.yyyymmdd_HHMMSS_host-name_juniper.conf.gzB.host-name_juniper.conf.gz_yyyymmdd_HHMMSSC.yyyymmdd_HHMMSS_host-name_juniper.confD.host-name_juniper.conf_yyyymmdd_HHMMSS

考题 A technician is using a packet sniffer to identify a server. The technician observes the followingnetwork traffic:Which of the following is MOST likely to be the server?() A.HOST-AB.HOST-BC.HOST-CD.HOST-D

考题 WhenconfiguringdualVIOserverstoconnecttoSANbaseddiskinfailovermode,whatsettingmustbeapplied?() A.algorithm=failoverB.algorithm=round_robinC.reserve_policy=no_reserveD.reserve_policy=single_path

考题 ASA/PIXversion7.0introducedModularPolicyFramework(MPF)asanextensiblewaytoclassifytraffic,andthenapplypolicies(oractions)tothattraffic.MPFataminimum requireswhichthreecommands?() A.http-map,tcp-map,class-mapB.class-map,tcp-map,policy-mapC.class-map,policy-map,service-mapD.class-map,service-policy,policy-map

考题 Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。 A.Host 1 addresses the frames to the MAC address of router R1B.Host 1 looks in its ARP cache for the MAC address of router R1C.Host 1 addresses the frames to the MAC address of web server 2D.Host 1 sends the packets to router R1 to be forwarded to web server 2E.Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2