Which two security policy actions are valid?()A、denyB、discardC、rejectD、close

题目

Which two security policy actions are valid?()

  • A、deny
  • B、discard
  • C、reject
  • D、close
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

A. A client group is a list of clients associated with a group.

B. A client group is a list of groups associated with a client.

C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.

D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


参考答案:B, C

第2题:

Which two parameters are configured in IPsec policy? ()(Choose two.)

A. mode

B. IKE gateway

C. security proposal

D. Perfect Forward Secrecy


参考答案:C, D

第3题:

Click the Exhibit button.What are two valid reasons for the output shown in the exhibit?() (Choose two.)

A. The local Web-filtering daemon is not enabled or is not running.

B. The integrated Web-filtering policy server is not reachable.

C. No DNS is configured on the SRX Series device.

D. No security policy is configured to use Web filtering.


参考答案:B, C

第4题:

Which two actions, when taken in combination, will result in an effective network security solution?()

  • A、 develop a policy for securing the network
  • B、 monitor and test network activities for vulnerabilities
  • C、 implement reflexive access lists
  • D、 implement dynamic access lists
  • E、 select and implement a single comprehensive virus protection program

正确答案:A,B

第5题:

What are two valid actions for routing policy?()

A. discard

B. next policy

C. accept

D. ignore


参考答案:B, C

第6题:

Whichtwosecuritypolicyactionsarevalid?()

A.deny

B.discard

C.reject

D.close


参考答案:A, C

第7题:

Which two policy actions are considered flow control actions?()

A.reject

B.community add

C.next term

D.next policy


参考答案:C, D

第8题:

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

A. Traffic is permitted from the trust zone to the untrust zone.

B. Intrazone traffic in the trust zone is permitted.

C. All traffic through the device is denied.

D. The policy is matched only when no other matching policies are found.


参考答案:C, D

第9题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第10题:

Which two firewall user authentication objects can be referenced in a security policy?()

  • A、access profile
  • B、client group
  • C、client
  • D、default profile

正确答案:B,C

更多相关问题