网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()
A

Source TCP port

B

Source IP address

C

Destination TCP port

D

Destination IP address


参考答案

参考解析
解析: 暂无解析
更多 “单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()A Source TCP portB Source IP addressC Destination TCP portD Destination IP address” 相关考题
考题 A Windows Communication Foundation (WCF) solution uses two services to manage a shopping cart. Service A processes messages containing line items that total between $0 and $500. Service B processes messages containing line items that total more than $500. All messages are of equal importance to the business logic. You need to route incoming messages to the appropriate services by using WCF routing. Which two message filters should you add to the router? (Each correct answer presents part of the solution. Choose two.)()A.a message filter with a priority of 100 that will forward messages that total between $0 and $500 to Service AB.a message filter with a priority of 0 that will forward messages that total between $0 and $500 to Service AC.a message filter with a priority of 0 that will forward all messages to Service BD.a message filter with a priority of 100 that will forward all messages to Service B

考题 Which two statements apply to policy scheduling?() (Choose two.) A. An individual policy can have only one scheduler applied.B. You must manually configure system-time updates.C. Multiple policies can use the same scheduler.D. Policies that do not have schedulers are not active.

考题 You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()A. CLIB. WebUIC. NSMD. Junos Pulse Access Control Service

考题 You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop

考题 You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A. from source-portB. from source-addressC. from destination-addressD. from destination-port

考题 Which two firewall filter actions will terminate the processing and evaluation of a packet?() A. permitB. acceptC. denyD. discard

考题 A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? () A. inbound traffic transiting the routerB. outbound traffic transiting the routerC. traffic destined to the Routing EngineD. traffic destined to the interface address on which the filter is applied

考题 A packet is evaluated against three user-defined terms within a firewall filter and no match is found. What correctly describes the action the firewall filter will take for this packet?()A、The filter will permit the packet and take no additional actionB、The filter will reject the packet and send an ICMP message back to the senderC、The filter will discard the packet and take no additional actionD、The filter will permit the packet and write a log entry to the firewall log

考题 A packet is evaluated against three user-defined terms within a firewall filter and no match is found. What correctly describes the action the firewall filter will take for this packet?()A、The filter will permit the packet and take no additional action.B、The filter will reject the packet and send an ICMP message back to the sender.C、The filter will discard the packet and take no additional action.D、The filter will permit the packet and write a log entry to the firewall log.

考题 You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port

考题 Which two statements are true about firewall filter configurations?()A、Multiple action modifiers can be included in the same term.B、Only a single action modifier can be included in the same term.C、The default term within a firewall filter uses the discard action.D、The default term within a firewall filter uses the reject action.

考题 What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()A、IP addressB、MAC addressC、protocolD、portE、session ID

考题 Which two statements apply to policy scheduling?() (Choose two.)A、An individual policy can have only one scheduler applied.B、You must manually configure system-time updates.C、Multiple policies can use the same scheduler.D、Policies that do not have schedulers are not active.

考题 You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()A、as an outbound filter on interface fxp0B、as an outbound filter on interface lo0C、as an inbound filter on interface fxp0D、as an inbound filter on interface lo0

考题 Which two firewall filter actions will terminate the processing and evaluation of a packet?()A、permitB、acceptC、denyD、discard

考题 You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop

考题 You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing connection security rules.Which of the following is TRUE with regards to connection security rules?()A、Connection security rules allows for traffic to be secured via IPsec.B、Connection security rules do not allow the traffic through the firewall.C、Connection security rules are applied to programs or servicesD、Connection security rules are applied between two computers.

考题 多选题Click the Exhibit button. In the exhibit,the protect-re filter is applied as an input filter on the lo0.0 interface and all possible services are enabled under [edit system services].  Which two methods can you use to access the router?()AFTPBSSHCTelnetDJ-Web

考题 多选题Which two statements are true about firewall filter configurations?()AMultiple action modifiers can be included in the same term.BOnly a single action modifier can be included in the same term.CThe default term within a firewall filter uses the discard action.DThe default term within a firewall filter uses the reject action.

考题 多选题A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? ()Ainbound traffic transiting the routerBoutbound traffic transiting the routerCtraffic destined to the Routing EngineDtraffic destined to the interface address on which the filter is applied

考题 多选题What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()AIP addressBMAC addressCprotocolDportEsession ID

考题 单选题You need to control SSH. HTTP, and Telnet access to an MX240 router through any interface. You have decided to use a firewall filter. How should you apply the firewall filter?()A as an outbound filter on interface fxp0B as an outbound filter on interface lo0C as an inbound filter on interface fxp0D as an inbound filter on interface lo0

考题 多选题You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()ACLIBWebUICNSMDJunos Pulse Access Control Service

考题 单选题A packet is evaluated against three user-defined terms within a firewall filter and no match is found. What correctly describes the action the firewall filter will take for this packet?()A The filter will permit the packet and take no additional actionB The filter will reject the packet and send an ICMP message back to the senderC The filter will discard the packet and take no additional actionD The filter will permit the packet and write a log entry to the firewall log

考题 单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()A Source TCP portB Source IP addressC Destination TCP portD Destination IP address

考题 单选题A packet is evaluated against three user-defined terms within a firewall filter and no match is found. What correctly describes the action the firewall filter will take for this packet?()A The filter will permit the packet and take no additional action.B The filter will reject the packet and send an ICMP message back to the sender.C The filter will discard the packet and take no additional action.D The filter will permit the packet and write a log entry to the firewall log.

考题 单选题You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()A as an outbound filter on interface fxp0B as an outbound filter on interface lo0C as an inbound filter on interface fxp0D as an inbound filter on interface lo0

考题 多选题You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action.Which two statements are true about traffic evaluated by this firewall filter?()APackets within the 10.0.0.0/24 subnet will be accepted.BPackets within the 10.0.0.0/24 subnet will be rejected.CPackets within the 10.0.0.0/24 subnet will be counted.DPackets within the 10.0.0.0/24 subnet will not be counted.