网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
A
zone objects
B
policy objects
C
attack objects
D
alert and notify objects
E
network and address objects
参考答案
参考解析
解析:
暂无解析
更多 “多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects” 相关考题
考题
Which three options represent IDP policy match conditions? ()(Choose three.)
A.serviceB.to-zoneC.attacksD.portE.destination-address
考题
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
A. zone objectsB. policy objectsC. attack objectsD. alert and notify objectsE. network and address objects
考题
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
A. access profileB. client groupC. clientD. default profileE. external
考题
What are three components of the NET address? ()(Choose three.)
A. Area IDB. N-selectorC. System IDD. ISO numberE. MAC address
考题
Which three static objects are cached by the client-side WXC device?() (Choose three.)
A. XMLB. HTMLC. JPEGD. JavaScriptsE. Cascading Style Sheets
考题
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address
考题
Which three options represent IDP policy match conditions? ()(Choose three.)A、serviceB、to-zoneC、attacksD、portE、destination-address
考题
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address
考题
What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()A、default gatewayB、DNS serversC、FTP serverD、helper addressE、subnet maskF、TFTP server
考题
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
考题
Which three static objects are cached by the client-side WXC device?() (Choose three.)A、XMLB、HTMLC、JPEGD、JavaScriptsE、Cascading Style Sheets
考题
What are three configuration objects used to build JUNOS IDP rules?()A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
考题
Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)A、routing-instanceB、zoneC、interfaceD、policyE、rule-set
考题
What are three components of the NET address? ()(Choose three.)A、Area IDB、N-selectorC、System IDD、ISO numberE、MAC address
考题
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)A、access profileB、client groupC、clientD、default profileE、external
考题
多选题What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。AprotocolBVLAN numberCTCP or UDP port numbersDsource switch port numberEsource IP address and destination IP addressFsource MAC address and destination MAC address
考题
多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal
考题
多选题What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()Adefault gatewayBDNS serversCFTP serverDhelper addressEsubnet maskFTFTP server
考题
多选题Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)Arouting-instanceBzoneCinterfaceDpolicyErule-set
考题
多选题What are three configuration objects used to build JUNOS IDP rules?()Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects
考题
多选题Which three static objects are cached by the client-side WXC device?() (Choose three.)AXMLBHTMLCJPEGDJavaScriptsECascading Style Sheets
考题
多选题Which three functions are provided by the Junos OS for security platforms?()(Choose three.)AVPN establishmentBstateful ARP lookupsCDynamic ARP inspectionDNetwork Address TranslationEinspection of packets at higher levels (Layer 4 and above)
考题
多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects
考题
多选题Which three options represent IDP policy match conditions? ()(Choose three.)AserviceBto-zoneCattacksDportEdestination-address
考题
多选题What are three key pre-installation/configuration considerations when deploying a WX device?() (Choose three.)AcablingBcommunity topologyCrequires a license keyDrequires two IP addressesEregistration server designation
考题
多选题Which three methods of source NAT does the Junos OS support?() (Choose three.)Ainterface-based source NATBsource NAT with address shiftingCsource NAT using static source poolDinterface-based source NAT without PATEsource NAT with address shifting and PAT
考题
多选题Which three represent IDP policy match conditions? ()(Choose three.)AprotocolBsource-addressCportDapplicationEattacks
考题
多选题What are three components of the NET address? ()(Choose three.)AArea IDBN-selectorCSystem IDDISO numberEMAC address
热门标签
最新试卷