网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What is a Host Enforcer policy?()
A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.
B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.
C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.
D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.
参考答案
更多 “ What is a Host Enforcer policy?() A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic. ” 相关考题
考题
Click the Exhibit button.Referring to the exhibit, which statement contains the correct gateway parameters?()
A. [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }B. [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }C. [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }D. [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }
考题
Which statement contains the correct parameters for a route-based IPsec VPN?()
A. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }B. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }C. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }D. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
考题
Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?()
A. policy-rematchB. policy-evaluateC. rematch-policyD. evaluate-policy
考题
You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN.On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each participating interface, what provides this functionality?()A. guest-vlanB. auth-fail-vlanC. server-reject-vlanD. server-fail-vlan
考题
ABGProuterhasthefollowingconfiguration:protocols{bgp{export[policy-1policy-2policy-3];}}policy-options{policy-statementpolicy-2{termget-statics{fromprotocolstatic;thenaccept;}termreject-all{thenreject;}}policy-statementpolicy-1{termget-aggregate{fromprotocolaggregate;thenaccept;}termreject-all{thenreject;}}policy-statementpolicy-3{termget-ospf{fromprotocolospf;thenaccept;}termreject-all{thenreject;}}}Whichpolicytermisevaluatedfirstwhenexportingroutes?()
考题
Which naming convention is used by Juniper Routers when archiving their configurations to a remote server?()
A.yyyymmdd_HHMMSS_host-name_juniper.conf.gzB.host-name_juniper.conf.gz_yyyymmdd_HHMMSSC.yyyymmdd_HHMMSS_host-name_juniper.confD.host-name_juniper.conf_yyyymmdd_HHMMSS
考题
A technician is using a packet sniffer to identify a server. The technician observes the followingnetwork traffic:Which of the following is MOST likely to be the server?()
A.HOST-AB.HOST-BC.HOST-CD.HOST-D
考题
WhenconfiguringdualVIOserverstoconnecttoSANbaseddiskinfailovermode,whatsettingmustbeapplied?()
A.algorithm=failoverB.algorithm=round_robinC.reserve_policy=no_reserveD.reserve_policy=single_path
考题
ASA/PIXversion7.0introducedModularPolicyFramework(MPF)asanextensiblewaytoclassifytraffic,andthenapplypolicies(oractions)tothattraffic.MPFataminimum requireswhichthreecommands?()
A.http-map,tcp-map,class-mapB.class-map,tcp-map,policy-mapC.class-map,policy-map,service-mapD.class-map,service-policy,policy-map
考题
Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。
A.Host 1 addresses the frames to the MAC address of router R1B.Host 1 looks in its ARP cache for the MAC address of router R1C.Host 1 addresses the frames to the MAC address of web server 2D.Host 1 sends the packets to router R1 to be forwarded to web server 2E.Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2
热门标签
最新试卷