Which three advanced permit actions within security policies are valid?() (Choose three.)A、Mark permitted traffic for firewall user authentication.B、Mark permitted traffic for SCREEN options.C、Associate permitted traffic with an IPsec tunnel.D、Associate p

题目

Which three advanced permit actions within security policies are valid?() (Choose three.)

  • A、Mark permitted traffic for firewall user authentication.
  • B、Mark permitted traffic for SCREEN options.
  • C、Associate permitted traffic with an IPsec tunnel.
  • D、Associate permitted traffic with a NAT rule.
  • E、Mark permitted traffic for IDP processing.
参考答案和解析
正确答案:A,C,E
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

A. Traffic is permitted from the trust zone to the untrust zone.

B. Intrazone traffic in the trust zone is permitted.

C. All traffic through the device is denied.

D. The policy is matched only when no other matching policies are found.


参考答案:C, D

第2题:

Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?()

A.

B.

C.

D.


参考答案:D

第3题:

Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)

A. DNS traffic is denied.

B. HTTP traffic is denied.

C. FTP traffic is permitted.

D. SMTP traffic is permitted.


参考答案:A, C

第4题:

What are three characteristics of a service tunnel? ()(Choose three.)

A. It is bidirectional.

B. It carries optimized traffic.

C. It can carry traffic using UDP.

D. It is formed only within a community


参考答案:B, C, D

第5题:

On which three traffic types does firewall pass-through authentication work? ()(Choose three.)

A. ping

B. FTP

C. Telnet

D. HTTP

E. HTTPS


参考答案:B, C, D

第6题:

Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()

A.

B.

C.

D.


参考答案:A

第7题:

Which three advanced permit actions within security policies are valid?() (Choose three.)

A. Mark permitted traffic for firewall user authentication.

B. Mark permitted traffic for SCREEN options.

C. Associate permitted traffic with an IPsec tunnel.

D. Associate permitted traffic with a NAT rule.

E. Mark permitted traffic for IDP processing.


参考答案:A, C, E

第8题:

Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)

A. MIME pattern

B. file extension

C. IP spoofing

D. POP3

E. protocol command


参考答案:A, B, E

第9题:

Based on the configuration shown in the exhibit, what will happen to the traffic matching the securitypolicy?()

A. The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.

B. The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.

C. The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.

D. The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.


参考答案:C

第10题:

What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()

  • A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks
  • B、 automatic reconfiguration s of the security devices based on current security threats
  • C、 containment and control of security threats
  • D、 application security
  • E、 anti-x defense F- virtual firewall

正确答案:C,D,E

更多相关问题