多选题Which three represent IDP policy match conditions? ()(Choose three.)AprotocolBsource-addressCportDapplicationEattacks

多选题
Which three represent IDP policy match conditions? ()(Choose three.)
A

protocol

B

source-address

C

port

D

application

E

attacks


参考解析

解析: 暂无解析

相关考题:

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.) A. routing-instanceB. zoneC. interfaceD. policyE. rule-set

Which three represent IDP policy match conditions? ()(Choose three.) A.protocolB.source-addressC.portD.applicationE.attacks

What are three configuration objects used to build Junos IDP rules? ()(Choose three.) A. zone objectsB. policy objectsC. attack objectsD. alert and notify objectsE. network and address objects

Which three parameters are configured in the IKE policy? ()(Choose three.) A. modeB. preshared keyC. external interfaceD. security proposalsE. dead peer detection settings

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.) A. access profileB. client groupC. clientD. default profileE. external

Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevantB、The action is specified in a then statementC、Ters are optional in a policyD、The match condition can be identified with a from statementE、Every policy must contain at least one term

Which three options represent IDP policy match conditions?()A、protocolB、source-addressC、portD、applicationE、attacks

Which three packet interception methods are configurable in WX devices?() (Choose three.)A、OSPFB、WCCPC、policy based routingD、route injection using RIPv1E、route injection using RIPv2

Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevant.B、The action is specified in a then statement.C、Terms are optional in a policy.D、The match condition can be identified with a from statement.E、A from statement is mandatory in a term.

Which three options represent IDP policy match conditions? ()(Choose three.)A、serviceB、to-zoneC、attacksD、portE、destination-address

Which three statements are true regarding IDP?()A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP inspects traffic up to the Application layer.C、IDP searches the data stream for specific attack patterns.D、IDP inspects traffic up to the Presentation layer.E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

Which statement regarding the implementation of an IDP policy template is true?()A、IDP policy templates are automatically installed as the active IDP policy.B、IDP policy templates are enabled using a commit script.C、IDP policy templates can be downloaded without an IDP license.D、IDP policy templates are included in the factory-default configuration.

You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()A、activating a JUNOS Software commit scriptB、configuring an IDP groups statementC、setting up a chassis clusterD、downloading the IDP policy templatesE、installing the policy templates

What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

Which two conditions will cause switch-to-wire to occur? ()(Choose two.)A、loss of powerB、QoS congestionC、software failure occuredD、WX device exceeded its license speedE、traffic does not match application definiton

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)A、routing-instanceB、zoneC、interfaceD、policyE、rule-set

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)A、access profileB、client groupC、clientD、default profileE、external

多选题Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)Arouting-instanceBzoneCinterfaceDpolicyErule-set

多选题Which three options represent IDP policy match conditions?()AprotocolBsource-addressCportDapplicationEattacks

多选题Which two conditions will cause switch-to-wire to occur? ()(Choose two.)Aloss of powerBQoS congestionCsoftware failure occuredDWX device exceeded its license speedEtraffic does not match application definiton

多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevantBThe action is specified in a then statementCTers are optional in a policyDThe match condition can be identified with a from statementEEvery policy must contain at least one term

多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal

多选题You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()Aactivating a JUNOS Software commit scriptBconfiguring an IDP groups statementCsetting up a chassis clusterDdownloading the IDP policy templatesEinstalling the policy templates

多选题Which three options represent IDP policy match conditions? ()(Choose three.)AserviceBto-zoneCattacksDportEdestination-address

多选题Which three parameters are configured in the IKE policy? ()(Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings

单选题Which statement regarding the implementation of an IDP policy template is true?()AIDP policy templates are automatically installed as the active IDP policy.BIDP policy templates are enabled using a commit script.CIDP policy templates can be downloaded without an IDP license.DIDP policy templates are included in the factory-default configuration.

多选题Which three represent IDP policy match conditions? ()(Choose three.)AprotocolBsource-addressCportDapplicationEattacks

多选题Which three are considered match criteria in a policy?()Aprefix-listBprotocol ospfCnext-termDAS pathEprefix-term