多选题What are three configuration objects used to build JUNOS IDP rules?()Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

多选题
What are three configuration objects used to build JUNOS IDP rules?()
A

zone objects

B

policy objects

C

attack objects

D

alert and notify objects

E

network and address objects


参考解析

解析: 暂无解析

相关考题:

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.) A. routing-instanceB. zoneC. interfaceD. policyE. rule-set

What are three configuration objects used to build Junos IDP rules? ()(Choose three.) A. zone objectsB. policy objectsC. attack objectsD. alert and notify objectsE. network and address objects

What are three benefits of IF-MAP Federation?() A. Enables seamless access for remote access users to firewall enforcer protected resources.B. Scales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.C. Enables dynamic configuration synchronization across multiple MAG Series devices.D. Provides a substitute for WAN clustering among geographically separated MAG Series devices.E. Shares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.

What are three components of a scheduler?() A.Forwarding ClassB.PriorityC.TOS MarkingD.Buffer SizeE.RED Configuration

Which account is used to access a Junos device in a factory-default configuration?() A. rootB. adminC. juniperD. user

What is the purpose of the NBAR protocol discovery?()A、to build a Packet Description Language Module (PDLM) file to be used in protocol matchingB、to discover applications and build class maps for data classificationC、to look into the TCP or UDP payload and classify packets based on the contentD、to build a database of all application data that passes through the router and queue the data accordingly

What are three components of a scheduler?()A、Forwarding ClassB、PriorityC、TOS MarkingD、Buffer SizeE、RED Configuration

What is a redundancy group in JUNOS Software?()A、a set of chassis clusters that fail over as a groupB、a set of devices that participate in a chassis clusterC、a set of VRRP neighbors that fail over as a groupD、a set of chassis cluster objects that fail over as a group

Which three statements are true regarding IDP?()A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP inspects traffic up to the Application layer.C、IDP searches the data stream for specific attack patterns.D、IDP inspects traffic up to the Presentation layer.E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

Which statement regarding the implementation of an IDP policy template is true?()A、IDP policy templates are automatically installed as the active IDP policy.B、IDP policy templates are enabled using a commit script.C、IDP policy templates can be downloaded without an IDP license.D、IDP policy templates are included in the factory-default configuration.

Which three objects represent pools used in Mobile Service Profiles in the Cisco UCS?()A、WWNB、VSANC、UUIDD、MACE、VU/N

You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()A、activating a JUNOS Software commit scriptB、configuring an IDP groups statementC、setting up a chassis clusterD、downloading the IDP policy templatesE、installing the policy templates

What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

Which two statements are true regarding IDP?()A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.C、IDP inspects traffic up to the Presentation layer.D、IDP inspects traffic up to the Application layer.

In JUNOS software, which three routing protocols can be used to route IPv6?()A、IS-ISB、StaticC、RIPv2D、OSPFv2E、MP-BGP

What are three configuration objects used to build JUNOS IDP rules?()A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)A、routing-instanceB、zoneC、interfaceD、policyE、rule-set

多选题Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)Arouting-instanceBzoneCinterfaceDpolicyErule-set

多选题In JUNOS software, which three routing protocols can be used to route IPv6?()AIS-ISBStaticCRIPv2DOSPFv2EMP-BGP

多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.

多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

多选题Which three statements are true regarding IDP?()AIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP inspects traffic up to the Application layer.CIDP searches the data stream for specific attack patterns.DIDP inspects traffic up to the Presentation layer.EIDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

多选题What are three benefits of IF-MAP Federation?()AEnables seamless access for remote access users to firewall enforcer protected resources.BScales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.CEnables dynamic configuration synchronization across multiple MAG Series devices.DProvides a substitute for WAN clustering among geographically separated MAG Series devices.EShares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.

多选题You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()Aactivating a JUNOS Software commit scriptBconfiguring an IDP groups statementCsetting up a chassis clusterDdownloading the IDP policy templatesEinstalling the policy templates

多选题Which three objects represent pools used in Mobile Service Profiles in the Cisco UCS?()AWWNBVSANCUUIDDMACEVU/N

多选题What are three components of a scheduler?()AForwarding ClassBPriorityCTOS MarkingDBuffer SizeERED Configuration

单选题Which account is used to access a Junos device in factory-default configuration?()ArootBadminCjuniperDuser