单选题Which statement describes the behavior of a security policy?()AThe implicit default security policy permits all traffic.BTraffic destined to the device itself always requires a security policy.CTraffic destined to the device’s incoming interface does not require a security policy.DThe factory-default configuration permits all traffic from all interfaces.

单选题
Which statement describes the behavior of a security policy?()
A

The implicit default security policy permits all traffic.

B

Traffic destined to the device itself always requires a security policy.

C

Traffic destined to the device’s incoming interface does not require a security policy.

D

The factory-default configuration permits all traffic from all interfaces.


参考解析

解析: 暂无解析

相关考题:

Which statement is true about terms in a policy?() A. A single term can be applied to a protocol or interface, independent of the policy.B. Once configured, terms within a policy cannot be reordered.C. The name of a term is limited to five characters.D. A from statement is optional in a term.

Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?() A. policy-rematchB. policy-evaluateC. rematch-policyD. evaluate-policy

Which statement is correct about a Routing Policy term?() A.A term must contain a from statement.B.A term acts like if and then statements.C.The most specific term has precedence.D.Terms can be written in any order to achieve the same behavior.

Which statement best describes Cisco IOS Zone-Based Policy Firewall?()A、A router interface can belong to multiple zones.B、Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.C、The pass action works in only one directionD、A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.

Which statement is true about terms in a policy?()A、A single term can be applied to a protocol or interface, independent of the policy.B、Once configured, terms within a policy cannot be reordered.C、The name of a term is limited to five characters.D、A from statement is optional in a term.

Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?()A、policy-rematchB、policy-evaluateC、rematch-policyD、evaluate-policy

Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevant.B、The action is specified in a then statement.C、Terms are optional in a policy.D、The match condition can be identified with a from statement.E、A from statement is mandatory in a term.

Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management

As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()A、Create a design specification document.B、Integrate routing and switching components.C、Document power and UPS availabilityD、Document the customer's current and future technology projects.

When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()A、Third-party due diligence policy reviewB、Remote Access PolicyC、Encryption PolicyD、Application change control policyE、Security Personnel policy

Which statement is correct about a Routing Policy term?()A、A term must contain a "from" statement.B、A term acts like "if" and "then" statements.C、The most specific term has precedence.D、Terms can be written in any order to achieve the same behavior.

Which statement is true about source NAT?()A、Source NAT works only with source pools.B、Destination NAT is required to translate the reply traffic.C、Source NAT does not require a security policy to function.D、The egress interface IP address can be used for source NAT

Regarding zone types, which statement is true?()A、You cannot assign an interface to a functional zone.B、You can specifiy a functional zone in a security policy.C、Security zones must have a scheduler applied.D、You can use a security zone for traffic destined for the device itself.

The ERX Edge Router can utilize which two classifiers?()A、multi fieldB、policy classifierC、quality of serviceD、behavior aggregate

多选题When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()AThird-party due diligence policy reviewBRemote Access PolicyCEncryption PolicyDApplication change control policyESecurity Personnel policy

单选题Which statement describes a security zone?()AA security zone can contain one or more interfaces.BA security zone can contain interfaces in multiple routing instances.CA security zone must contain two or more interfaces.DA security zone must contain bridge groups.

多选题Which two security policy actions are valid?()AdenyBdiscardCrejectDclose

单选题A network vulnerability scanner is part of which critical element of network and system security?()A host securityB perimeter securityC security monitoringD policy management

单选题Which statement is true about source NAT?()ASource NAT works only with source pools.BDestination NAT is required to translate the reply traffic.CSource NAT does not require a security policy to function.DThe egress interface IP address can be used for source NAT

单选题Which statement accurately describes firewall user authentication?()AFirewall user authentication provides another layer of security in a network.BFirewall user authentication provides a means for accessing a JUNOS Software-based security device.CFirewall user authentication enables session-based forwarding.DFirewall user authentication is used as a last resort security method in a network.

多选题Which two can be used to create and apply an export policy that advertises static routes to RIP neighbors?()Aset protocols rip export demoBedit policy-options policy-statement demo set term 1 from protocol static set term 1 then acceptCedit policy-options policy-statement demo set term 1 from protocol staticDset policy-options policy-statement demo

单选题Regarding zone types, which statement is true?()AYou cannot assign an interface to a functional zone.BYou can specifiy a functional zone in a security policy.CSecurity zones must have a scheduler applied.DYou can use a security zone for traffic destined for the device itself.

多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevant.BThe action is specified in a then statement.CTerms are optional in a policy.DThe match condition can be identified with a from statement.EA from statement is mandatory in a term.

单选题Which statement is correct about a Routing Policy term?()AA term must contain a from statement.BA term acts like if and then statements.CThe most specific term has precedence.DTerms can be written in any order to achieve the same behavior.