网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which three options represent IDP policy match conditions?()
- A、protocol
- B、source-address
- C、port
- D、application
- E、attacks
参考答案
更多 “Which three options represent IDP policy match conditions?()A、protocolB、source-addressC、portD、applicationE、attacks” 相关考题
考题
Which three options represent IDP policy match conditions? ()(Choose three.)
A.serviceB.to-zoneC.attacksD.portE.destination-address
考题
Which three represent IDP policy match conditions? ()(Choose three.)
A.protocolB.source-addressC.portD.applicationE.attacks
考题
Referring to the exhibit, which three networks match the policy?()
A. 192.168.0.0/20B. 192.168.0.0/16C. 192.168.128.0/18D. 192.168.128.0/21E. 192.168.64.0/24
考题
Which three of the following options are NOT fields found in an Ethernet frame?()
A.VersionB.TypeC.Source PortD.FlagsE.Data
考题
Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevantB、The action is specified in a then statementC、Ters are optional in a policyD、The match condition can be identified with a from statementE、Every policy must contain at least one term
考题
Which three options represent IDP policy match conditions? ()(Choose three.)A、serviceB、to-zoneC、attacksD、portE、destination-address
考题
Which three statements are true regarding IDP?()A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP inspects traffic up to the Application layer.C、IDP searches the data stream for specific attack patterns.D、IDP inspects traffic up to the Presentation layer.E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.
考题
What are two valid match criteria for a routing policy?()A、OSPF area IDB、prefix listC、portD、time-to-live (TTL)
考题
Which statement regarding the implementation of an IDP policy template is true?()A、IDP policy templates are automatically installed as the active IDP policy.B、IDP policy templates are enabled using a commit script.C、IDP policy templates can be downloaded without an IDP license.D、IDP policy templates are included in the factory-default configuration.
考题
You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()A、activating a JUNOS Software commit scriptB、configuring an IDP groups statementC、setting up a chassis clusterD、downloading the IDP policy templatesE、installing the policy templates
考题
Which two statements about the use of SCREEN options are correct?()A、SCREEN options are deployed at the ingress and egress sides of a packet flow.B、Although SCREEN options are very useful, their use can result in more session creation.C、SCREEN options offer protection against various attacks at the ingress zone of a packet flow.D、SCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.
考题
Which three of the following options are NOT fields found in an Ethernet frame?()A、VersionB、TypeC、Source PortD、FlagsE、Data
考题
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
考题
What are two valid match criteria for a routing policy? ()A、OSPF are a IDB、prefix listC、portD、time-to-live(TTL)
考题
Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevant.B、The action is specified in a then statement.C、Terms are optional in a policy.D、The match condition can be identified with a from statement.E、A from statement is mandatory in a term.
考题
Which three advanced permit actions within security policies are valid?() (Choose three.)A、Mark permitted traffic for firewall user authentication.B、Mark permitted traffic for SCREEN options.C、Associate permitted traffic with an IPsec tunnel.D、Associate permitted traffic with a NAT rule.E、Mark permitted traffic for IDP processing.
考题
Which two statements are true regarding IDP?()A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.C、IDP inspects traffic up to the Presentation layer.D、IDP inspects traffic up to the Application layer.
考题
Which three represent IDP policy match conditions? ()(Choose three.)A、protocolB、source-addressC、portD、applicationE、attacks
考题
Which three are considered match criteria in a policy?()A、prefix-listB、protocol ospfC、next-termD、AS pathE、prefix-term
考题
多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevantBThe action is specified in a then statementCTers are optional in a policyDThe match condition can be identified with a from statementEEvery policy must contain at least one term
考题
多选题You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()Aactivating a JUNOS Software commit scriptBconfiguring an IDP groups statementCsetting up a chassis clusterDdownloading the IDP policy templatesEinstalling the policy templates
考题
多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.
考题
多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevant.BThe action is specified in a then statement.CTerms are optional in a policy.DThe match condition can be identified with a from statement.EA from statement is mandatory in a term.
考题
单选题Which statement regarding the implementation of an IDP policy template is true?()A
IDP policy templates are automatically installed as the active IDP policy.B
IDP policy templates are enabled using a commit script.C
IDP policy templates can be downloaded without an IDP license.D
IDP policy templates are included in the factory-default configuration.
考题
多选题Which three represent IDP policy match conditions? ()(Choose three.)AprotocolBsource-addressCportDapplicationEattacks
考题
多选题Which three options represent IDP policy match conditions?()AprotocolBsource-addressCportDapplicationEattacks
考题
多选题Which three statements are true regarding IDP?()AIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP inspects traffic up to the Application layer.CIDP searches the data stream for specific attack patterns.DIDP inspects traffic up to the Presentation layer.EIDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.
热门标签
最新试卷