单选题Under which Junos hierarchy level are security policies configured?()A[edit security]B[edit protocols]C[edit firewall]D[edit policy-options]

单选题
Under which Junos hierarchy level are security policies configured?()
A

[edit security]

B

[edit protocols]

C

[edit firewall]

D

[edit policy-options]


参考解析

解析: 暂无解析

相关考题:

Employee unions would most likely satisfy which level in Maslow's hierarchy of needs?A BelongingB Self-actualizationC EsteemD SafetyE Empowerment

Which option provides a hierarchy of data security across lines of business?() A.AlertsB.Multi-OrgC.FlexfieldsD.Shared entitiesE.Business Intelligence

_______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.A.Security level 1B.Security level 2C.Security level 3D.Security level 4

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.) A. [edit security idp]B. [edit security zones security-zone trust interfaces ge-0/0/0.0]C. [edit security zones security-zone trust]D. [edit security screen]

Under which Junos hierarchy level are security policies configured?() A. [edit security]B. [edit protocols]C. [edit firewall]D. [edit policy-options]

Which security or functional zone name has special significance to the Junos OS?() A. selfB. trustC. untrustD. junos-global

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()A. Session-Export policies on the Junos Pulse Secure Access ServiceB. Session-Export policies on the Junos Pulse Access Control ServiceC. Session-Import policies on the Junos Pulse Secure Access ServiceD. Session-Import policies on the Junos Pulse Access Control ServiceE. Resource access policies on the Junos Pulse Access Control Service

Which of the following are examples of physical security measures?() A. Policies and proceduresB. EncryptionC. Locked doorsD. Security personnelE. Backup tapes

According to JUNOS software route selection algorithm, which IS-IS route type is most preferred?()A、Level 1 internal routesB、Level 1 external routesC、Level 2 internal routesD、Level 2 external routes

After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()A、The Junos OS drops any flow that does not match the source address or destination address.B、All traffic is dropped.C、All existing sessions continue.D、The Junos OS does a policy re-evaluation.

Which security or functional zone name has special significance to the Junos OS?()A、selfB、trustC、untrustD、junos-global

Which option provides a hierarchy of data security across lines of business?()A、AlertsB、Multi-OrgC、FlexfieldsD、Shared entitiesE、Business Intelligence

You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A、[edit security policies from-zone HR to-zone HR]B、[edit security zones functional-zone management protocols]C、[edit security zones protocol-zone HR host-inbound-traffic]D、[edit security zones security-zone HR host-inbound-traffic protocols]

Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

Under which configuration hierarchy is an access profile configured for firewall user authentication?()A、[edit access]B、[edit security access]C、[edit firewall access]D、[edit firewall-authentication]

In which hierarchy are routing policies defined?()A、[edit policy-options]B、[edit routing-options]C、[edit forwarding-options]D、[edit protocols]

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A、[edit security idp]B、[edit security zones security-zone trust interfaces ge-0/0/0.0]C、[edit security zones security-zone trust]D、[edit security screen]

Under which Junos hierarchy level are security policies configured?()A、[edit security]B、[edit protocols]C、[edit firewall]D、[edit policy-options]

单选题Which option provides a hierarchy of data security across lines of business?()AAlertsBMulti-OrgCFlexfieldsDShared entitiesEBusiness Intelligence

单选题() means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.ASecurity level 1BSecurity level 2CSecurity level 3DMedium safe level

多选题Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()ASession-Export policies on the Junos Pulse Secure Access ServiceBSession-Export policies on the Junos Pulse Access Control ServiceCSession-Import policies on the Junos Pulse Secure Access ServiceDSession-Import policies on the Junos Pulse Access Control ServiceEResource access policies on the Junos Pulse Access Control Service

单选题After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()AThe Junos OS drops any flow that does not match the source address or destination address.BAll traffic is dropped.CAll existing sessions continue.DThe Junos OS does a policy re-evaluation.

多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security screen]

单选题You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A[edit security policies from-zone HR to-zone HR]B[edit security zones functional-zone management protocols]C[edit security zones protocol-zone HR host-inbound-traffic]D[edit security zones security-zone HR host-inbound-traffic protocols]

多选题Which two statements regarding firewall user authentication client groups are true?()AIndividual clients are configured under client groups in the configuration hierarchy.BClient groups are configured under individual clients in the configuration hierarchy.CClient groups are referenced in security policy in the same manner in which individual clients are referenced.DClient groups are used to simplify configuration by enabling firewall user authentication without security policy.

单选题Under which configuration hierarchy is an access profile configured for firewall user authentication?()A[edit access]B[edit security access]C[edit firewall access]D[edit firewall-authentication]

单选题Rate your level of proficiency with configuring, managing, and troubleshooting security on Windows XP Professional, including Encrypting File System (EFS), local security policies and configurations, local user and group accounts, and Internet Explorer Security settings.()AVery HighBHighCModerateDLowEVery Low