多选题Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()APassBFlowCAllowDInspect

多选题
Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()
A

Pass

B

Flow

C

Allow

D

Inspect


参考解析

解析: 暂无解析

相关考题:

Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)A. DNS traffic is denied.B. HTTP traffic is denied.C. FTP traffic is permitted.D. SMTP traffic is permitted.

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS

Which two authentication protocols can be configured for RIP on an ERX Edge Router? () A.AB.BC.CD.D

Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm

Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

What is the main reason for using the "ip ips deny-action ips-interface" IOS command?()A、 To selectively apply drop actions to specific interfacesB、 To enable IOS to droptraffic for signatures configured with the Drop actionC、 To support load-balancing configurations in which traffic can arrive via multipleinterfaces D、 This is nota valid IOS command

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

Which three practices are important to the implementation of a DiffServ QoS architecture?()A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.

Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

Which two statements about static NAT translations are true?()A、They are always present in the NAT table.B、They allow connection to be initiated from the outside.C、They can be configured with access lists, to allow two or more connections to be initiated from the outside.D、They require no inside or outside interface markings because addresses are statically defined.

Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

The Cisco SDM can configure most, but not all, routing protocols. Which two of these routing protocols can be configured using SDM? (Choose two.)()A、 BGPB、 IGRPC、 ISISD、 OSPFE、 EIGRP

Which two CRM servers allow Cisco Unified Call Connector to be configured for connectivity?()A、 SiebelB、 Microsoft DynamicsC、 ACT!D、 Salesforce.comE、 Oncontact

You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

Which three actions can a branch SRX Series device perform on a spam e-mail message?() (Choose three.)A、It can drop the connection at the IP address levelB、It can block the e-mail based upon the sender IDC、It can allow the e-mail and bypass all UTM inspectionD、It can allow the e-mail to be forwarded, but change the intended recipient to a new e-mail addressE、It can allow the e-mail to be forwarded to the destination, but tag it with a custom value in the subject line

多选题Which two locations can be configured as a source for the IOS image in the boot system command?()ARAMBNVRAMCflash memoryDHTTP serverETFTP serverFTelnet server

单选题What is the main reason for using the "ip ips deny-action ips-interface" IOS command?()A To selectively apply drop actions to specific interfacesB To enable IOS to droptraffic for signatures configured with the Drop actionC To support load-balancing configurations in which traffic can arrive via multipleinterfaces D This is nota valid IOS command

多选题Which two options can be used as traffic descriptors when classifying and marking traffic? ()Aincoming interfaceBLayer 2 differentiated services code point (DSCP)CLayer 3 IP precedenceDoutgoing interface

多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

多选题Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()AIt can be used to block bulk encryption attacksBIt can be used to protect against denial of service attacksCTraffic originating from the router is considered trusted, so it is not inspectedDBased upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyETemporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

单选题As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()ANetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.BNetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.CNetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.DNetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

多选题Which two CRM servers allow Cisco Unified Call Connector to be configured for connectivity?()ASiebelBMicrosoft DynamicsCACT!DSalesforce.comEOncontact

多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.

多选题Which two statements about static NAT translations are true?()AThey are always present in the NATt able.BThey allow connection to be initiated from the outside.CThey can be configured with access lists,to allow two or more connections to be initiated from the outside.DThey require no inside or outside interface markings because addresses are statically defined.

多选题In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()AIt is used for PIM control trafficBIt is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routersCWithin the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sourcesDThere is a reduced multicast state in the MPLS core P routersEWhen multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth

多选题The Cisco SDM can configure most, but not all, routing protocols. Which two of these routing protocols can be configured using SDM? (Choose two.)()ABGPBIGRPCISISDOSPFEEIGRP

多选题Which two CRM servers allow Cisco Unified Call Connector to be configured for connectivity?()AMicrosoft DynamicsBSalesforce.comCOncontactDSiebelEACT!

多选题Which three actions can a branch SRX Series device perform on a spam e-mail message?() (Choose three.)AIt can drop the connection at the IP address levelBIt can block the e-mail based upon the sender IDCIt can allow the e-mail and bypass all UTM inspectionDIt can allow the e-mail to be forwarded, but change the intended recipient to a new e-mail addressEIt can allow the e-mail to be forwarded to the destination, but tag it with a custom value in the subject line