网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()
A

set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-Spam

B

set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-Spam

C

set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policy

D

set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam


参考答案

参考解析
解析: 暂无解析
更多 “单选题You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam” 相关考题
考题 Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)A. DNS traffic is denied.B. HTTP traffic is denied.C. FTP traffic is permitted.D. SMTP traffic is permitted.

考题 In the Junos OS, which statement is true?() A. vlan.0 belongs to the untrust zone.B. You must configure Web authentication to allow inbound traffic in the untrust zone.C. The zone name untrust has no special meaning.D. The untrust zone is not configurable.

考题 Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.) A. an antispam licenseB. DNS servers configured on the SRX Series deviceC. SMTP services on SRXD. a UTM profile with an antispam configuration in the appropriate security policyE. antivirus (full or express)

考题 A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone.Which configuration statement would correctly accomplish this task?()A. from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C. from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

考题 Click the Exhibit button.Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2.Which is a potential cause for this problem?() A. The untrust zone does not have a management policy configured.B. The trust zone does not have ping enabled as host-inbound-traffic service.C. The security policy from the trust zone to the untrust zone does not permit ping.D. No security policy exists for the ICMP reply packet from the untrust zone to the trust zone.

考题 Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }A、DNS traffic is denied.B、HTTP traffic is denied.C、FTP traffic is permitted.D、SMTP traffic is permitted.

考题 A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()A、from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C、from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

考题 In the Junos OS, which statement is true?()A、vlan.0 belongs to the untrust zone.B、You must configure Web authentication to allow inbound traffic in the untrust zone.C、The zone name "untrust" has no special meaning.D、The untrust zone is not configurable.

考题 Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.)A、an antispam licenseB、DNS servers configured on the SRX Series deviceC、SMTP services on SRXD、a UTM profile with an antispam configuration in the appropriate security policyE、antivirus (full or express)

考题 Which three situations will trigger an e-mail to be flagged as spam if a branch SRX Series device has been properly configured with antispam inspection enabled for the appropriate security policy? ()(Choose three.)A、The server sending the e-mail to the SRX Series device is a known open SMTP relay.B、The server sending the e-mail to the SRX Series device is running unknown SMTP server software.C、The server sending the e-mail to the SRX Series device is on an IP address range that is known to be dynamically assigned.D、The e-mail that the server is sending to the SRX Series device has a virus in its attachment.E、The server sending the e-mail to the SRX Series device is a known spammer IP address.

考题 You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A、set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have a Terminal Services farm that contains several Terminal Servers. One of the Terminal Serversshould be configured as a dedicated redirector. After you configure the appropriate DNS records,what action should you perform next?()A、The server should be configured to deny new user logons from Terminal Services Configuration.B、The licensing mode should be set to per user from Terminal Services Configuration.C、The licensing mode should be set to per device from Terminal Services Configuration.D、The relative weight of the server should be changed to 50 from Terminal Services Configuration.

考题 You are the network administrator for the Paris branch office of Fourth Coffee.The Paris office has a Windows Server 2003 DNS server named Server10. Server10 hosts a DNS primary zone named fourthcoffee.com. All computers in the Paris office are configured to use Server10 as their preferred DNS server. The Berlin branch office of Fourth Coffee has a UNIX DNS server named Server11. Server11 hosts a primary zone named engineering.fourthcoffee.com. The refresh interval of the engineering.fourthcoffee.com zone is set to 24 hours. In the Berlin office, a firewall filters all incoming network traffic from other offices. A rule on this firewall prevents all computers from the Paris office network, except Server10, from performing DNS lookups against Server11.There is a business requirement that no delay should occur between the time that a new record is created in the engineering.fourthcoffee.com zone and the time that the record can be resolved from any computers in the Paris office. All computers in the Paris office must be able to resolve names in the engineering.fourthcoffee.com namespace.You need to configure DNS on Server10 to meet the requirements.  What should you do?()A、Set up a stub zone named engineering.fourthcoffee.com.B、Set up conditional forwarding to Server11 for the engineering.fourthcoffee.com namespace.C、In the fourthcoffee.com zone, set up a delegation to the engineering.fourthcoffee.com zone on Server11.D、Set up a secondary zone named engineering.fourthcoffee.com that has Server11 as master.

考题 You have an Active Directory domain named contoso.com.   You have a domain controller named Server1 that is configured as a DNS server.   Server1 hosts a standard primary zone for contoso.com. The DNS configuration of Server1 is shown in  the exhibit. (Click the Exhibit button.)   You discover that stale resource records are not automatically removed from the contoso.com zone.   You need to ensure that the stale resource records are automatically removed from the contoso.com  zone.   What should you do()A、Set the scavenging period of Server1 to 0 days.B、Modify the Server Aging/Scavenging properties.C、Configure the aging properties for the contoso.com zone.D、Convert the contoso.com zone to an Active Directory-integrated zone.

考题 Your network contains a domain controller that is configured as a DNS server. The server hosts an  Active Directory-integrated zone for the domain.   You need to reduce how long it takes until stale records are deleted from the zone.  What should you do()A、From the configuration directory partition of the forest, modify the tombstone lifetime.B、From the configuration directory partition of the forest, modify the garbage collection interval.C、From the aging properties of the zone, modify the no-refresh interval and the refresh interval.D、From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval.

考题 Your network contains a domain controller that is configured as a DNS server. The server hosts an Active Directory-integrated zone for the domain. You need to reduce how long it takes until stale records are deleted from the zone. What should you do?()A、From the configuration directory partition of the forest, modify the tombstone lifetime.B、From the configuration directory partition of the forest, modify the garbage collection intervalC、From the aging properties of the zone, modify the no-refresh interval and the refresh intervalD、From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval

考题 多选题Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.)Aan antispam licenseBDNS servers configured on the SRX Series deviceCSMTP services on SRXDa UTM profile with an antispam configuration in the appropriate security policyEantivirus (full or express)

考题 单选题You have an Exchange Server 2010 Edge Transport server named Server1.You create a spam quarantine mailbox on a Mailbox server.You need to configure Server1 to send spam e-mail messages to the quarantine mailbox.Which properties should you configure?()A content filteringB default Receive connectorC Send connectorD sender filtering

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have a Terminal Services farm that contains several Terminal Servers. One of the Terminal Serversshould be configured as a dedicated redirector. After you configure the appropriate DNS records,what action should you perform next?()A The server should be configured to deny new user logons from Terminal Services Configuration.B The licensing mode should be set to per user from Terminal Services Configuration.C The licensing mode should be set to per device from Terminal Services Configuration.D The relative weight of the server should be changed to 50 from Terminal Services Configuration.

考题 单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()A from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

考题 单选题You Have DNS server named DC1 that runs Windows Server 2003 Service Pack 2 (SP2). DC1 hosts an Active Directory-integrated zone that has dynamic updates enabled. You enable aging and scavenging for the zone. You discover that stale records are not being removed from the zone. You need ensure that stale records are removed from the zone.  What should you do?( )A Reduce the Refresh interval for the zone.B Enable aging and scavenging for the server.C Reduce the No-Refresh interval for the zone.D Open the DNS snap-in, right -click DC1, and select Update Server Data Files.

考题 单选题Your network contains a domain controller that is configured as a DNS server. The server hosts an Active Directory-integrated zone for the domain. You need to reduce how long it takes until stale records are deleted from the zone. What should you do?()A From the configuration directory partition of the forest, modify the tombstone lifetime.B From the configuration directory partition of the forest, modify the garbage collection intervalC From the aging properties of the zone, modify the no-refresh interval and the refresh intervalD From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval

考题 单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()A AB BC CD D

考题 单选题Click the Exhibit button. Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2. Which is a potential cause for this problem?()A The untrust zone does not have a management policy configured.B The trust zone does not have ping enabled as host-inbound-traffic service.C The security policy from the trust zone to the untrust zone does not permit ping.D No security policy exists for the ICMP reply packet from the untrust zone to the trust zone.

考题 单选题You have an Active Directory domain named contoso.com. You have a domain controller named  Server1 that is configured as a DNS server. Server1 hosts a standard primary zone for contoso.com. The DNS configuration of Server1 is shown in the exhibit. (Click the Exhibit button.)  You discover that stale resource records are not automatically removed from the contoso.com  zone. You need to ensure that the stale resource records are automatically removed from the  contoso.com zone.     What should you do()A Set the scavenging period of Server1 to 0 days.B Modify the Server Aging/Scavenging properties.C Configure the aging properties for the contoso.com zone.D Convert the contoso.com zone to an Active Directory-integrated zone.

考题 单选题In the Junos OS, which statement is true?()A vlan.0 belongs to the untrust zone.B You must configure Web authentication to allow inbound traffic in the untrust zone.C The zone name untrust has no special meaning.D The untrust zone is not configurable.

考题 单选题Your network contains a domain controller that is configured as a DNS server. The server hosts  an Active Directory-integrated zone for the domain.     You need to reduce how long it takes until stale records are deleted from the zone.     What should you do()A From the configuration directory partition of the forest, modify the tombstone lifetime.B From the configuration directory partition of the forest, modify the garbage collection interval.C From the aging properties of the zone, modify the no-refresh interval and the refresh interval.D From the start of authority (SOA) record of the zone, modify the refresh interval and the expire interval.