itgle.com

多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

题目
多选题
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
A

zone objects

B

policy objects

C

attack objects

D

alert and notify objects

E

network and address objects


相似考题
更多“多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects”相关问题
  • 第1题:

    Which three static objects are cached by the client-side WXC device?() (Choose three.)

    A. XML

    B. HTML

    C. JPEG

    D. JavaScripts

    E. Cascading Style Sheets


    参考答案:C, D, E

  • 第2题:

    Which three options represent IDP policy match conditions? ()(Choose three.)

    • A、service
    • B、to-zone
    • C、attacks
    • D、port
    • E、destination-address

    正确答案:B,C,E

  • 第3题:

    What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()

    • A、default gateway
    • B、DNS servers
    • C、FTP server
    • D、helper address
    • E、subnet mask
    • F、TFTP server

    正确答案:A,B,E

  • 第4题:

    Which three static objects are cached by the client-side WXC device?() (Choose three.)

    • A、XML
    • B、HTML
    • C、JPEG
    • D、JavaScripts
    • E、Cascading Style Sheets

    正确答案:C,D,E

  • 第5题:

    Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)

    • A、routing-instance
    • B、zone
    • C、interface
    • D、policy
    • E、rule-set

    正确答案:A,B,C

  • 第6题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第7题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: A,C
    解析: 暂无解析

  • 第8题:

    多选题
    Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)
    A

    routing-instance

    B

    zone

    C

    interface

    D

    policy

    E

    rule-set


    正确答案: E,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which three static objects are cached by the client-side WXC device?() (Choose three.)
    A

    XML

    B

    HTML

    C

    JPEG

    D

    JavaScripts

    E

    Cascading Style Sheets


    正确答案: C,D
    解析: 暂无解析

  • 第10题:

    多选题
    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
    A

    zone objects

    B

    policy objects

    C

    attack objects

    D

    alert and notify objects

    E

    network and address objects


    正确答案: E,D
    解析: 暂无解析

  • 第11题:

    多选题
    What are three key pre-installation/configuration considerations when deploying a WX device?() (Choose three.)
    A

    cabling

    B

    community topology

    C

    requires a license key

    D

    requires two IP addresses

    E

    registration server designation


    正确答案: A,D
    解析: 暂无解析

  • 第12题:

    多选题
    Which three represent IDP policy match conditions? ()(Choose three.)
    A

    protocol

    B

    source-address

    C

    port

    D

    application

    E

    attacks


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

    A.protocol

    B.VLAN number

    C.TCP or UDP port numbers

    D.source switch port number

    E.source IP address and destination IP address

    F.source MAC address and destination MAC address


    参考答案:A, C, E

  • 第14题:

    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

    • A、protocol
    • B、VLAN number
    • C、TCP or UDP port numbers
    • D、source switch port number
    • E、source IP address and destination IP address
    • F、source MAC address and destination MAC address

    正确答案:A,C,E

  • 第15题:

    What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

    • A、zone objects
    • B、policy objects
    • C、attack objects
    • D、alert and notify objects
    • E、network and address objects

    正确答案:A,C,E

  • 第16题:

    What are three configuration objects used to build JUNOS IDP rules?()

    • A、zone objects
    • B、policy objects
    • C、attack objects
    • D、alert and notify objects
    • E、network and address objects

    正确答案:A,C,E

  • 第17题:

    What are three components of the NET address? ()(Choose three.)

    • A、Area ID
    • B、N-selector
    • C、System ID
    • D、ISO number
    • E、MAC address

    正确答案:A,B,C

  • 第18题:

    多选题
    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
    A

    protocol

    B

    VLAN number

    C

    TCP or UDP port numbers

    D

    source switch port number

    E

    source IP address and destination IP address

    F

    source MAC address and destination MAC address


    正确答案: B,A
    解析: 暂无解析

  • 第19题:

    多选题
    What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()
    A

    default gateway

    B

    DNS servers

    C

    FTP server

    D

    helper address

    E

    subnet mask

    F

    TFTP server


    正确答案: B,F
    解析: 暂无解析

  • 第20题:

    多选题
    What are three configuration objects used to build JUNOS IDP rules?()
    A

    zone objects

    B

    policy objects

    C

    attack objects

    D

    alert and notify objects

    E

    network and address objects


    正确答案: E,B
    解析: 暂无解析

  • 第21题:

    多选题
    Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
    A

    VPN establishment

    B

    stateful ARP lookups

    C

    Dynamic ARP inspection

    D

    Network Address Translation

    E

    inspection of packets at higher levels (Layer 4 and above)


    正确答案: C,E
    解析: 暂无解析

  • 第22题:

    多选题
    Which three options represent IDP policy match conditions? ()(Choose three.)
    A

    service

    B

    to-zone

    C

    attacks

    D

    port

    E

    destination-address


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which three methods of source NAT does the Junos OS support?() (Choose three.)
    A

    interface-based source NAT

    B

    source NAT with address shifting

    C

    source NAT using static source pool

    D

    interface-based source NAT without PAT

    E

    source NAT with address shifting and PAT


    正确答案: E,D
    解析: 暂无解析

  • 第24题:

    多选题
    What are three components of the NET address? ()(Choose three.)
    A

    Area ID

    B

    N-selector

    C

    System ID

    D

    ISO number

    E

    MAC address


    正确答案: D,B
    解析: 暂无解析