网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which two of these are advantages of placing the VPN device parallel to the firewall?()

A. high scalability

B. the design supports a layered security model

C. firewall addressing does not need to change

D. IPsec decrypted traffic is inspected by the firewall

E. there is a centralized point for logging and content inspection


参考答案

更多 “ Which two of these are advantages of placing the VPN device parallel to the firewall?() A. high scalabilityB. the design supports a layered security modelC. firewall addressing does not need to changeD. IPsec decrypted traffic is inspected by the firewallE. there is a centralized point for logging and content inspection ” 相关考题
考题 A traditional router is better suited than a firewall device for which function? () A. VPN establishmentB. packet-based forwardingC. stateful packet processingD. network address translation

考题 As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A. inline with a firewallB. in a DMZ outside the firewallC. parallel with a firewallD. in a DMZ behind the firewall

考题 Which two of these are advantages of placing the VPN device in the DMZ on the firewall?() A. fewer devices to manageB. moderate-to-high scalabilityC. stateful inspection of decrypted VPN trafficD. increased bandwidth with additional interfacesE. decreased complexity as traffic is filtered from the firewall

考题 What is the recommended practice when considering VPN termination and firewall placement?() A. have the firewall and VPN appliance deployed in parallelB. place the VPN in line with the firewall, with the VPN terminating inside the firewallC. place the public side of the VPN termination device in the DMZ behind a firewallD. place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()A、Broadband serviceB、Headend VPN deviceC、VPN access deviceD、Tunnel

考题 Which two actions protect a resource file from direct HTTP access within a web application?()A、Placing it in the /secure directoryB、Placing it in the /WEB-INF directoryC、Placing it in the /META-INF/secure directoryD、Creating a  element within the deployment descriptor

考题 Which two statements are correct about firewall filters in the Junos OS?()A、Firewall filters are stateless.B、Firewall filters are used to control routing information that is exchanged between devices.C、Firewall filters are used to control traffic passing through the device.D、Firewall filters can only be applied to traffic entering the device.

考题 A traditional router is better suited than a firewall device for which function?()A、VPN establishmentB、packet-based forwardingC、stateful packet processingD、Network Address Translation

考题 Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()A、 onboard VPN acceleratorB、 events correlation and proactive responseC、 high-performance AIM VPN modulesD、 virtual firewallE、 Cisco lOS Firewall and lOS IPSF、 transparent firewall

考题 Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()A、 CiscoWorks Security Device Management Center (SD/MC)B、 Security Device Manager (SDM)C、 Adaptive Security Device Manager (ASDM)D、 CiscoWorks VMS/Management Center (VMS/MC)

考题 Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()A、fewer devices to manageB、moderate-to-high scalabilityC、stateful inspection of decrypted VPN trafficD、increased bandwidth with additional interfacesE、decreased complexity as traffic is filtered from the firewall

考题 What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 Which two of these are advantages of placing the VPN device parallel to the firewall?()A、 high scalabilityB、 the design supports a layered security modelC、 firewall addressing does not need to changeD、 IPsec decrypted traffic is inspected by the firewallE、 there is a centralized point for logging and content inspection

考题 As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A、 inline with a firewallB、 in a DMZ outside the firewallC、 parallel with a firewallD、 in a DMZ behind the firewall

考题 Which data synchronization options between two geographical locations are supported by PowerHA SystemMirror?()A、Parallel and SerialB、Serial and AsynchronousC、Parallel and SynchronousD、Synchronous and Asynchronous

考题 Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()A、 Configure VPN1 as a DHCP Relay Agent.B、 Configure VPN1 to assign IP Address by using DHCP server.C、 Configure VPN1 to have a static pool of IP Address from the network address of 131.107.1.0/24.D、 Configure VPN1 to have a static pool of IP Address from the network address of 192.168.1.0/24.E、 Configure the perimeter firewall to allow inbound DHCP traffic to be passed to VPN1.F、 Configure the interval firewall to allow DHCP broadcasts to be forwarded from the external network to the internal network.

考题 单选题As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A inline with a firewallB in a DMZ outside the firewallC parallel with a firewallD in a DMZ behind the firewall

考题 多选题Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()Aonboard VPN acceleratorBevents correlation and proactive responseChigh-performance AIM VPN modulesDvirtual firewallECisco lOS Firewall and lOS IPSFtransparent firewall

考题 单选题Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()A  CiscoWorks Security Device Management Center (SD/MC)B  Security Device Manager (SDM)C  Adaptive Security Device Manager (ASDM)D  CiscoWorks VMS/Management Center (VMS/MC)

考题 单选题As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A  inline with a firewallB  in a DMZ outside the firewallC  parallel with a firewallD  in a DMZ behind the firewall

考题 多选题Which two statements are correct about firewall filters in the Junos OS?()AFirewall filters are stateless.BFirewall filters are used to control routing information that is exchanged between devices.CFirewall filters are used to control traffic passing through the device.DFirewall filters can only be applied to traffic entering the device.

考题 多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 多选题Which two of these are advantages of placing the VPN device parallel to the firewall?()Ahigh scalabilityBthe design supports a layered security modelCfirewall addressing does not need to changeDIPsec decrypted traffic is inspected by the firewallEthere is a centralized point for logging and content inspection

考题 单选题What is the recommended practice when considering VPN termination and firewall placement?()A  have the firewall and VPN appliance deployed in parallelB  place the VPN in line with the firewall, with the VPN terminating inside the firewallC  place the public side of the VPN termination device in the DMZ behind a firewallD  place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 多选题Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()Afewer devices to manageBmoderate-to-high scalabilityCstateful inspection of decrypted VPN trafficDincreased bandwidth with additional interfacesEdecreased complexity as traffic is filtered from the firewall