多选题Which two security policy actions are valid?()AdenyBdiscardCrejectDclose

多选题
Which two security policy actions are valid?()
A

deny

B

discard

C

reject

D

close


参考解析

解析: 暂无解析

相关考题:

Which two parameters are configured in IPsec policy? ()(Choose two.) A. modeB. IKE gatewayC. security proposalD. Perfect Forward Secrecy

Which two policy actions are considered flow control actions?() A.rejectB.community addC.next termD.next policy

What are two valid actions for routing policy?() A. discardB. next policyC. acceptD. ignore

Which two actions, when taken in combination, will result in an effective network security solution?()A、 develop a policy for securing the networkB、 monitor and test network activities for vulnerabilitiesC、 implement reflexive access listsD、 implement dynamic access listsE、 select and implement a single comprehensive virus protection program

Which two firewall user authentication objects can be referenced in a security policy?()A、access profileB、client groupC、clientD、default profile

Which two parameters are configured in IPsec policy?()A、modeB、IKE gatewayC、security proposalD、Perfect Forward Secrecy

Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

Which two security policy actions are valid?()A、denyB、discardC、rejectD、close

Which two policy actions are considered flow control actions?()A、rejectB、community addC、next termD、next policy

What are two valid actions for a routing policy?()A、discardB、next policyC、acceptD、ignore

Which two parameters are configured in IPsec policy? ()(Choose two.)A、modeB、IKE gatewayC、security proposalD、Perfect Forward Secrecy

You are creating a destination NAT rule-set. Which two are valid for use with the from clause?()A、security policyB、interfaceC、routing-instanceD、IP address

You need to configure the security settings for the new app servers. Which two actions should you perform?()A、Create a Group policy object (GPO) for the web servers.B、Create a Group policy object (GPO) for the database servers.C、Modify the Default Domain Policy.D、Modify the Default Domain Controllers Policy.

You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()A、Place all infrastructure servers in subnets that cannot exchange information with the InternetB、Establish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversC、Use Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversD、Edit the local policy settings to configure each individual server

多选题You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()APlace all infrastructure servers in subnets that cannot exchange information with the InternetBEstablish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversCUse Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversDEdit the local policy settings to configure each individual server

多选题Which two actions, when taken in combination, will result in an effective network security solution?()Adevelop a policy for securing the networkBmonitor and test network activities for vulnerabilitiesCimplement reflexive access listsDimplement dynamic access listsEselect and implement a single comprehensive virus protection program

多选题Which two policy actions are considered flow control actions?()ArejectBcommunity addCnext termDnext policy

多选题Which two security policy actions are valid?()AdenyBdiscardCrejectDclose

多选题Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()APassBFlowCAllowDInspect

多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.

多选题Which two statements regarding firewall user authentication client groups are true?() (Choose two.)AA client group is a list of clients associated with a group.BA client group is a list of groups associated with a client.CClient groups are referenced in security policy in the same manner in which individual clients are referenced.DClient groups are used to simplify configuration by enabling firewall user authentication without security policy.

多选题What are two valid actions for a routing policy?()AdiscardBnext policyCacceptDignore

多选题You need to configure the security settings for the new app servers.  Which two actions should you perform?()ACreate a Group policy object (GPO) for the web servers.BCreate a Group policy object (GPO) for the database servers.CModify the Default Domain Policy.DModify the Default Domain Controllers Policy.

多选题Which two firewall user authentication objects can be referenced in a security policy?()Aaccess profileBclient groupCclientDdefault profile

多选题You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()ADisable all unnecessary services on each DHCP serverBModify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversCUse an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverDInstall a digital certificate for SSL on each DHCP server

多选题Which two are needed components when designing and implementing a security solution?()Adetailed VLAN informationBan incident response planCresults of testing the new network configurationDan existing hierarchical network topologyEa security policy for your organization

多选题Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)ATraffic is permitted from the trust zone to the untrust zone.BIntrazone traffic in the trust zone is permitted.CAll traffic through the device is denied.DThe policy is matched only when no other matching policies are found.