网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which three represent IDP policy match conditions? ()(Choose three.)
- A、protocol
- B、source-address
- C、port
- D、application
- E、attacks
参考答案
更多 “Which three represent IDP policy match conditions? ()(Choose three.)A、protocolB、source-addressC、portD、applicationE、attacks” 相关考题
考题
Which three represent IDP policy match conditions? ()(Choose three.)
A.protocolB.source-addressC.portD.applicationE.attacks
考题
Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()
A. close-connectionB. terminate-connectionC. close-client-and-serverD. terminate-session
考题
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
A. zone objectsB. policy objectsC. attack objectsD. alert and notify objectsE. network and address objects
考题
Which of the following words does NOT represent a "P" of three-P model A.Presentation.
B.Practice.
C.Pre-reading.
D.Production.
考题
Which of the following words does NOT represent a "P" of three-P model A.Presentation.
B.Practice.
C.Pre-reading.
D.Production.
考题
Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevantB、The action is specified in a then statementC、Ters are optional in a policyD、The match condition can be identified with a from statementE、Every policy must contain at least one term
考题
Which three options represent IDP policy match conditions?()A、protocolB、source-addressC、portD、applicationE、attacks
考题
Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A、close-connectionB、terminate-connectionC、close-client-and-serverD、terminate-session
考题
Which three options represent IDP policy match conditions? ()(Choose three.)A、serviceB、to-zoneC、attacksD、portE、destination-address
考题
Which three statements are true regarding IDP?()A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP inspects traffic up to the Application layer.C、IDP searches the data stream for specific attack patterns.D、IDP inspects traffic up to the Presentation layer.E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.
考题
Which statement regarding the implementation of an IDP policy template is true?()A、IDP policy templates are automatically installed as the active IDP policy.B、IDP policy templates are enabled using a commit script.C、IDP policy templates can be downloaded without an IDP license.D、IDP policy templates are included in the factory-default configuration.
考题
Which three objects represent pools used in Mobile Service Profiles in the Cisco UCS?()A、WWNB、VSANC、UUIDD、MACE、VU/N
考题
You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()A、activating a JUNOS Software commit scriptB、configuring an IDP groups statementC、setting up a chassis clusterD、downloading the IDP policy templatesE、installing the policy templates
考题
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
考题
Which two statements are true regarding IDP?()A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.C、IDP inspects traffic up to the Presentation layer.D、IDP inspects traffic up to the Application layer.
考题
What are three configuration objects used to build JUNOS IDP rules?()A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
考题
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)A、access profileB、client groupC、clientD、default profileE、external
考题
You have been tasked with performing an update to the IDP attack database. Which three requirements areincluded as part of this task?()A、The IDP security package must be installed after it is downloaded.B、The device must be rebooted to complete the update.C、The device must be connected to a network.D、An IDP license must be installed on your device.E、You must be logged in as the root user
考题
多选题Which three options represent IDP policy match conditions?()AprotocolBsource-addressCportDapplicationEattacks
考题
多选题You have been tasked with performing an update to the IDP attack database. Which three requirements areincluded as part of this task?()AThe IDP security package must be installed after it is downloaded.BThe device must be rebooted to complete the update.CThe device must be connected to a network.DAn IDP license must be installed on your device.EYou must be logged in as the root user
考题
单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A
close-connectionB
terminate-connectionC
close-client-and-serverD
terminate-session
考题
多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal
考题
多选题You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()Aactivating a JUNOS Software commit scriptBconfiguring an IDP groups statementCsetting up a chassis clusterDdownloading the IDP policy templatesEinstalling the policy templates
考题
多选题Which three options represent IDP policy match conditions? ()(Choose three.)AserviceBto-zoneCattacksDportEdestination-address
考题
多选题Which three parameters are configured in the IKE policy? ()(Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings
考题
多选题Which three objects represent pools used in Mobile Service Profiles in the Cisco UCS?()AWWNBVSANCUUIDDMACEVU/N
考题
单选题Which statement regarding the implementation of an IDP policy template is true?()A
IDP policy templates are automatically installed as the active IDP policy.B
IDP policy templates are enabled using a commit script.C
IDP policy templates can be downloaded without an IDP license.D
IDP policy templates are included in the factory-default configuration.
考题
多选题Which three represent IDP policy match conditions? ()(Choose three.)AprotocolBsource-addressCportDapplicationEattacks
热门标签
最新试卷