What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

题目

What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

  • A、zone objects
  • B、policy objects
  • C、attack objects
  • D、alert and notify objects
  • E、network and address objects
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

A. zone objects

B. policy objects

C. attack objects

D. alert and notify objects

E. network and address objects


参考答案:A, C, E

第2题:

Which three static objects are cached by the client-side WXC device?() (Choose three.)

A. XML

B. HTML

C. JPEG

D. JavaScripts

E. Cascading Style Sheets


参考答案:C, D, E

第3题:

Which three options represent IDP policy match conditions? ()(Choose three.)

A.service

B.to-zone

C.attacks

D.port

E.destination-address


参考答案:B, C, E

第4题:

Which three options represent IDP policy match conditions? ()(Choose three.)

  • A、service
  • B、to-zone
  • C、attacks
  • D、port
  • E、destination-address

正确答案:B,C,E

第5题:

What are three valid Juniper Networks IPS attack object types?() (Choose three.)

  • A、signature
  • B、anomaly
  • C、trojan
  • D、virus
  • E、chain

正确答案:A,B,E

第6题:

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

A. access profile

B. client group

C. client

D. default profile

E. external


参考答案:A, B, C

第7题:

When using horizontal sextant angles of three objects to fix your position,an indeterminate position will result in which situation ________.

A.The objects lie in a straight line

B.The vessel is inside of a triangle formed by the objects

C.The vessel is outside of a triangle formed by the objects

D.A circle will pass through your position and the three objects


正确答案:D

第8题:

Which three functions are provided by the Junos OS for security platforms?()(Choose three.)

A. VPN establishment

B. stateful ARP lookups

C. Dynamic ARP inspection

D. Network Address Translation

E. inspection of packets at higher levels (Layer 4 and above)


参考答案:A, D, E

第9题:

A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()

  • A、from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
  • B、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
  • C、from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }
  • D、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

正确答案:B

第10题:

Which three statements are true regarding IDP?()

  • A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
  • B、IDP inspects traffic up to the Application layer.
  • C、IDP searches the data stream for specific attack patterns.
  • D、IDP inspects traffic up to the Presentation layer.
  • E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

正确答案:B,C,E

更多相关问题