网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which zone is a system-defined zone?()

  • A、null zone
  • B、trust zone
  • C、untrust zone
  • D、management zone

参考答案

更多 “Which zone is a system-defined zone?()A、null zoneB、trust zoneC、untrust zoneD、management zone” 相关考题
考题 若要建立正向区域和反向区域,应在下列哪个文件中编辑()。A.named.confB.named.rfc1912.zoneC.local.zoneD.named.zone

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

考题 In the Junos OS, which statement is true?() A. vlan.0 belongs to the untrust zone.B. You must configure Web authentication to allow inbound traffic in the untrust zone.C. The zone name untrust has no special meaning.D. The untrust zone is not configurable.

考题 A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone.Which configuration statement would correctly accomplish this task?()A. from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C. from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

考题 Which zone is system-defined?() A.securityB.functionalC.junos-globalD.management

考题 Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface

考题 Click the Exhibit button.Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2.Which is a potential cause for this problem?() A. The untrust zone does not have a management policy configured.B. The trust zone does not have ping enabled as host-inbound-traffic service.C. The security policy from the trust zone to the untrust zone does not permit ping.D. No security policy exists for the ICMP reply packet from the untrust zone to the trust zone.

考题 If the radio signal ground wave extends out for less distance than the minimum skywave distance,there is an area in which no signal is received.This is called the ______.A.Skip zoneB.Blackout zoneC.Diffraction zoneD.Shadow zone

考题 Which type of zone is used by traffic transiting the device?()A、transit zoneB、default zoneC、security zoneD、functional zone

考题 A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()A、from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C、from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

考题 Solaris缺省安装好后,整个系统被称作为()。A、大zoneB、全局zoneC、硬件zoneD、软件zone

考题 在Atoll中,下面哪个zone区域下允许存在多个polygon?()A、Focus ZoneB、Hotspot ZoneC、Printing ZoneD、Filtering Zone

考题 在Atoll仿真中,哪种zone完全不会影响覆盖图的统计结果?()A、Focus zoneB、Computation zoneC、Printing zoneD、Filtering zone

考题 在Atoll中,哪种zone完全不会影响覆盖图的统计结果?()A、Focus ZoneB、Computation ZoneC、Printing ZoneD、Filtering Zone

考题 使用Capesso前,在Atoll中必须提供的zone为()。A、Focus zoneB、Computation zoneC、Printing zoneD、Filtering zone

考题 In the Junos OS, which statement is true?()A、vlan.0 belongs to the untrust zone.B、You must configure Web authentication to allow inbound traffic in the untrust zone.C、The zone name "untrust" has no special meaning.D、The untrust zone is not configurable.

考题 You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in the Untrust zone. How do you create this policy?()A、Specify the IP address (172.19.1.1/32) as the destination address in the policy.B、Specify the DNS entry (hostb.example.com.) as the destination address in the policy.C、Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.D、Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy

考题 Users can define policy to control traffic flow between which two components?()A、from a zone to the device itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

考题 Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

考题 You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A、set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

考题 The current time zone for one of the user sessions is set to the database local time zone. For one application, the user session requires the time zone to be set to the local operating system time zone without affecting other user sessions. Which two solutions could the user implement to achieve this objective? ()A、 use the ALTER SYSTEM command to change the time zoneB、 use the ALTER SESSION command to change the time zoneC、 use the ALTER DATABASE command to change the time zoneD、 set the value for the operating system variable ORA_SDTZ on the client machineE、 set the value for the operating system variable ORA_SDTZ on the database server machine

考题 Your company has a main office and two branch offices that are connected by WAN links. The main office runs the DNS service on three domain controllers. The zone for your domain is configured as an Active Directory-integrated zone. Each branch office has a single member server that hosts a secondary zone for the domain. The DNS servers in the branch offices use the main office DNS server as the DNS Master server for the zone. You need to minimize DNS zone transfer traffic over the WAN links. What should you do?()A、Decrease the Retry Interval setting in the Start of Authority (SOA) record for the zoneB、Decrease the Refresh Interval setting in the Start of Authority (SOA) record for the zoneC、Increase the Refresh Interval setting in the Start of Authority (SOA) record for the zoneD、Disable the netmask ordering option in the properties of the DNS master server for the zone.

考题 单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()A AB BC CD D

考题 单选题Which zone is system-defined?()A securityB functionalC junos-globalD management

考题 单选题In the Junos OS, which statement is true?()A vlan.0 belongs to the untrust zone.B You must configure Web authentication to allow inbound traffic in the untrust zone.C The zone name untrust has no special meaning.D The untrust zone is not configurable.

考题 单选题Which zone is a system-defined zone?()A null zoneB trust zoneC untrust zoneD management zone