Which two policy actions are considered flow control actions?()A、rejectB、community addC、next termD、next policy

Which two policy actions are considered flow control actions?()

  • A、reject
  • B、community add
  • C、next term
  • D、next policy

相关考题:

Which two statements are true with regard to policy ordering? ()(Choose two.) A. The last policy is the default policy, which allows all traffic.B. The order of policies is not important.C. New policies are placed at the end of the policy list.D. The insert command can be used to change the order.

Which two parameters are configured in IPsec policy? ()(Choose two.) A. modeB. IKE gatewayC. security proposalD. Perfect Forward Secrecy

Which two policy actions are considered flow control actions?() A.rejectB.community addC.next termD.next policy

What are two valid actions for routing policy?() A. discardB. next policyC. acceptD. ignore

Which two actions, when taken in combination, will result in an effective network security solution?()A、 develop a policy for securing the networkB、 monitor and test network activities for vulnerabilitiesC、 implement reflexive access listsD、 implement dynamic access listsE、 select and implement a single comprehensive virus protection program

Which two firewall filter actions will terminate the processing and evaluation of a packet?()A、permitB、acceptC、denyD、discard

Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

The ERX Edge Router can utilize which two classifiers?()A、multi fieldB、policy classifierC、quality of serviceD、behavior aggregate

You need to configure the security settings for the new app servers. Which two actions should you perform?()A、Create a Group policy object (GPO) for the web servers.B、Create a Group policy object (GPO) for the database servers.C、Modify the Default Domain Policy.D、Modify the Default Domain Controllers Policy.

Your company acquires a new Internet domain name.You need to ensure that all users can receive e-mail messages sent to the new domain name.Which two actions should you perform?()A、Create a sharing policy.B、Create a remote domain.C、Create an accepted domain.D、Create an e-mail address policy.E、Modify the properties of the default Receive connector.

多选题Which two actions, when taken in combination, will result in an effective network security solution?()Adevelop a policy for securing the networkBmonitor and test network activities for vulnerabilitiesCimplement reflexive access listsDimplement dynamic access listsEselect and implement a single comprehensive virus protection program

多选题Which two statements are true with regard to policy ordering? ()(Choose two.)AThe last policy is the default policy, which allows all traffic.BThe order of policies is not important.CNew policies are placed at the end of the policy list.DThe insert command can be used to change the order.

多选题Which two security policy actions are valid?()AdenyBdiscardCrejectDclose

多选题You need to ensure that the company’s standard password policy is enforced for all logins that areused to access SQL Server 2005.Which two actions should you perform?()ASet the appropriate local password policies for all computers on which SQL Server is installed.BSet the server authentication mode of all SQL Server instances to Windows Authentication mode.CInstall all instances of SQL Server 2005 on computers that run Windows Server 2003 or later.DCreate SQL Server logins that have CHECK_POLICY enabled.

多选题Which two policy actions are considered flow control actions?()ArejectBcommunity addCnext termDnext policy

多选题Which two actions are available in the GUI for creating location awareness rules?()AWINS serverBDNS serverCIP reachabilityDResolve address

多选题You need to design desktop and security settings for the client computers in the Seattle call center. Your solution must be implemented by using the minimum amount of administrative effort.Which two actions should you perform?()AOn each client computer in the call center, configure a local policy that lists only authorized programs in the Allowed Windows Programs listBUsing NTFS permissions, assign the Deny – Read permission for all unauthorized executable files to the client computer domain accountsCDesign a Group Policy object (GPO) that enforces a software restriction policy on all client computers in the call centerDDesign a Group Policy object (GPO) that implements an IPSec policy on all client computers in the call center. Ensure that the IPSec policy rejects connections to any Web servers that the company does not operate

多选题You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()ADelegate the password management controls to the help desk staff.BDelegate the password management controls to the Domain Users group.CConfigure the Default Domain Policy to enforce password expiration settings.DConfigure the Default Domain Controller Policy to enforce password expiration settings.

多选题You have Active Directory Certificate Services (AD CS) deployed.  You create a custom certificate template.   You need to ensure that all of the users in the domain automatically enroll for a certificate based on the  custom certificate template.   Which two actions should you perform()AIn a Group Policy object (GPO), configure the autoenrollment settingsBIn a Group Policy object (GPO), configure the Automatic Certificate Request Settings.COn the certificate template, assign the Read and Autoenroll permission to the Authenticated Users  group.DOn the certificate template, assign the Read, Enroll, and Autoenroll permission to the Domain Users  group.

多选题Which two firewall user authentication objects can be referenced in a security policy?()Aaccess profileBclient groupCclientDdefault profile

多选题Which two parameters are configured in IPsec policy? ()(Choose two.)AmodeBIKE gatewayCsecurity proposalDPerfect Forward Secrecy

多选题Which two parameters are configured in IPsec policy?()AmodeBIKE gatewayCsecurity proposalDPerfect Forward Secrecy

多选题What are two valid actions for routing policy?()AdiscardBnext policyCacceptDignore

多选题Which two configuration elements are required for a policy-based VPN?()AIKE gatewayBsecure tunnel interfaceCsecurity policy to permit the IKE trafficDsecurity policy referencing the IPsec VPN tunnel

多选题You are designing a security strategy for the infrastructure servers at the resorts.Which two actions should you perform?(Each correct answer presents part of the solution. Choose two)()APlace all infrastructure servers in subnets that cannot exchange information with the InternetBEstablish a custom security template that contains unique required settings for each combination of services that run on the infrastructure serversCUse Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure serversDEdit the local policy settings to configure each individual server