网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()
A

VPN Traffic

B

DNS Traffic

C

LDAP Traffic

D

HTTP Traffic

E

HTTPS Traffic

F

Traffic from the network address of 192.168.10/24


参考答案

参考解析
解析: 暂无解析
更多 “多选题You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()AVPN TrafficBDNS TrafficCLDAP TrafficDHTTP TrafficEHTTPS TrafficFTraffic from the network address of 192.168.10/24” 相关考题
考题 You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?() A. as an outbound filter on interface fxp0B. as an outbound filter on interface lo0C. as an inbound filter on interface fxp0D. as an inbound filter on interface lo0

考题 A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? () A. inbound traffic transiting the routerB. outbound traffic transiting the routerC. traffic destined to the Routing EngineD. traffic destined to the interface address on which the filter is applied

考题 You have a computer that runs Windows Vista.You need to prevent all inbound traffic to your computer without being notified.What should you do?() A.AB.BC.CD.D

考题 On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()A.SMTPB.DNSC.FTPD.TelnetE.HTTPF.POP3

考题 On which three traffic types does firewall pass-through authentication work? ()(Choose three.)A、pingB、FTPC、TelnetD、HTTPE、HTTPS

考题 A Windows Azure application is activated for Windows Azure Connect A corporate policy blocks Internet traffic for local servers.  You need to recommend the firewall rule that will allow Windows Azure Connect traffic for local servers.  What should you recommend?()A、 Allow TCP port 443 inbound.B、 Allow TCP port 3389 outbound.C、 Allow TCP port 3389 inbound.D、 Allow TCP port 443 outbound.

考题 You need to prevent a custom application from connecting to the Internet. What should you do?()A、From Windows Firewall, add a program.B、From Windows Defender, modify the Allowed items list.C、From Windows Firewall with Advanced Security, create an inbound rule.D、From Windows Firewall with Advanced Security, create an outbound rule.

考题 Which two traffic types trigger pass-through firewall user authentication?()A、SSHB、TelnetC、ICMPD、OSPFE、HTTP

考题 Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

考题 Which two configuration options must be present for IPv4 transit traffic to pass between the ge-0/0/0.0 andge-0/0/2.0 interfaces?()A、family inetB、a security zoneC、a routing instanceD、host-inbound-traffic

考题 You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A、You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B、No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C、You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D、You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

考题 You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface. You have decided to use a firewall filter. How should you apply the firewall filter?()A、as an outbound filter on interface fxp0B、as an outbound filter on interface lo0C、as an inbound filter on interface fxp0D、as an inbound filter on interface lo0

考题 A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? ()A、inbound traffic transiting the routerB、outbound traffic transiting the routerC、traffic destined to the Routing EngineD、traffic destined to the interface address on which the filter is applied

考题 You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()A、VPN TrafficB、DNS TrafficC、LDAP TrafficD、HTTP TrafficE、HTTPS TrafficF、Traffic from the network address of 192.168.10/24

考题 You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()A、From Network and Sharing Center, click Connect to a network.B、From Network and Sharing Center, click Set up a new connection or network.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.D、From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.

考题 You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

考题 You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

考题 Your computer has Microsoft Windows Firewall enabled.  Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic.  You need to prevent your child from playing this game.  What should you do? ()A、Enable the User Account Control feature.B、Configure the user account of your child as a standard user.C、Create an outbound rule in Windows Firewall to block UDP port 5678.D、Create an outbound rule in Windows Firewall to block TCP port 5678.

考题 Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()A、Edge traversalB、Authorized computersC、Interface typesD、Remote IP address

考题 多选题Which two traffic types trigger pass-through firewall user authentication?()ASSHBTelnetCICMPDOSPFEHTTP

考题 多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS

考题 多选题On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()ASMTPBDNSCFTPDTelnetEHTTPFPOP3

考题 多选题Which two configuration options must be present for IPv4 transit traffic to pass between the ge-0/0/0.0 andge-0/0/2.0 interfaces?()Afamily inetBa security zoneCa routing instanceDhost-inbound-traffic

考题 多选题Which three statements accurately describe IOS Firewall configurations?()AThe IP inspection rule can be applied in the inbound direction on the secured interfaceBThe IP inspection rule can be applied in the outbound direction on the unsecured interfaceCThe ACL applied in the inbound direction on the unsecured interface should be an extendedACL.DFor temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

考题 单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A  Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B  Allow all inbound VPN traffic to pass through the perimeter firewall only.C  Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D  Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

考题 多选题You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()AConfigure VPN1 as a DHCP Relay Agent.BConfigure VPN1 to assign IP Address by using DHCP server.CConfigure VPN1 to have a static pool of IP Address from the network address of 131.107.1.0/24.DConfigure VPN1 to have a static pool of IP Address from the network address of 192.168.1.0/24.EConfigure the perimeter firewall to allow inbound DHCP traffic to be passed to VPN1.FConfigure the interval firewall to allow DHCP broadcasts to be forwarded from the external network to the internal network.

考题 单选题A Windows Azure application is activated for Windows Azure Connect A corporate policy blocks Internet traffic for local servers.  You need to recommend the firewall rule that will allow Windows Azure Connect traffic for local servers.  What should you recommend?()A  Allow TCP port 443 inbound.B  Allow TCP port 3389 outbound.C  Allow TCP port 3389 inbound.D  Allow TCP port 443 outbound.