You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop

You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()

  • A、then reject
  • B、then discard
  • C、then next filter
  • D、then silent-drop

相关考题:

Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()A.B.C.D.

Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?() A.B.C.D.

You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A. from source-portB. from source-addressC. from destination-addressD. from destination-port

By default, which command can be used to display information about packets that have been logged with the syslog firewall filter action?() A. show logB. show firewallC. show log messagesD. show firewall log

A packet is evaluated against three user-defined terms within a firewall filter and no match is found. What correctly describes the action the firewall filter will take for this packet?()A、The filter will permit the packet and take no additional actionB、The filter will reject the packet and send an ICMP message back to the senderC、The filter will discard the packet and take no additional actionD、The filter will permit the packet and write a log entry to the firewall log

A packet is evaluated against three user-defined terms within a firewall filter and no match is found. What correctly describes the action the firewall filter will take for this packet?()A、The filter will permit the packet and take no additional action.B、The filter will reject the packet and send an ICMP message back to the sender.C、The filter will discard the packet and take no additional action.D、The filter will permit the packet and write a log entry to the firewall log.

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port

Which two statements are true about firewall filter configurations?()A、Multiple action modifiers can be included in the same term.B、Only a single action modifier can be included in the same term.C、The default term within a firewall filter uses the discard action.D、The default term within a firewall filter uses the reject action.

You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()A、as an outbound filter on interface fxp0B、as an outbound filter on interface lo0C、as an inbound filter on interface fxp0D、as an inbound filter on interface lo0

以下配置邮件主题过滤关键字错误的是()。A、firewall smtp-filter subject add*B、firewall smtp-filter subject add*hello*C、firewall smtp-filter subject addhel loD、firewall smtp-filter subject add"hel lo"

You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A、 From Windows Firewall, add an exceptionB、 From windows Firewall enable the block all incoming connections optionC、 From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD、 From the Windows Firewall with Advanced Security snap-in, create an outbound rule.

You have a server that runs windows server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do?()A、From windows firewall, add an exception.B、From windows firewall enable the block all incoming connections option.C、From the windows firewall with advanced security snap-in, create an inbound rule.D、From the windows firewall with advanced security snap-in, create an outbound rule.

多选题Which two statements are true about firewall filter configurations?()AMultiple action modifiers can be included in the same term.BOnly a single action modifier can be included in the same term.CThe default term within a firewall filter uses the discard action.DThe default term within a firewall filter uses the reject action.

单选题You need to control SSH. HTTP, and Telnet access to an MX240 router through any interface. You have decided to use a firewall filter. How should you apply the firewall filter?()Aas an outbound filter on interface fxp0Bas an outbound filter on interface lo0Cas an inbound filter on interface fxp0Das an inbound filter on interface lo0

多选题以下命令中,()能清除邮件主题过滤关键字条目“hello”。Afirewall smtp-filter subject clearBfirewall smtp-filter subject delete helloCundo firewall smtp-filter subject helloDdelete firewall smtp-filter subject item hello

单选题You've configured an interface with an IP address and commited the change. You then commited a change that added an exception in a firewall filter to allow this network through the filter. You realize that this work was done on the wrong router. How do you undo all these changes?()Arollback 2Brollback 1Crollback 0Drollback 3

单选题A packet is evaluated against three user-defined terms within a firewall filter and no match is found. What correctly describes the action the firewall filter will take for this packet?()AThe filter will permit the packet and take no additional actionBThe filter will reject the packet and send an ICMP message back to the senderCThe filter will discard the packet and take no additional actionDThe filter will permit the packet and write a log entry to the firewall log

单选题You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A From Windows Firewall, add an exceptionB From windows Firewall enable the block all incoming connections optionC From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD From the Windows Firewall with Advanced Security snap-in, create an outbound rule.

单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()ASource TCP portBSource IP addressCDestination TCP portDDestination IP address

单选题By default, which command can be used to display information about packets that have been logged with the syslog firewall filter action?()Ashow logBshow firewallCshow log messagesDshow firewall log

单选题A packet is evaluated against three user-defined terms within a firewall filter and no match is found. What correctly describes the action the firewall filter will take for this packet?()AThe filter will permit the packet and take no additional action.BThe filter will reject the packet and send an ICMP message back to the sender.CThe filter will discard the packet and take no additional action.DThe filter will permit the packet and write a log entry to the firewall log.

单选题You configured an interface with an IP address and committed the change. You then committed a change that added an exception in a firewall filter to allow this network through the filter. You realize that this work was done on the wrong router. How do you undo all these changes?()Arollback 2Brollback 1Crollback 0Drollback 3

单选题You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()Aas an outbound filter on interface fxp0Bas an outbound filter on interface lo0Cas an inbound filter on interface fxp0Das an inbound filter on interface lo0

多选题You have configured a firewall filter with a single term matching on packets with a source address in the 10.0.0.0/24 subnet. This term only includes the count action.Which two statements are true about traffic evaluated by this firewall filter?()APackets within the 10.0.0.0/24 subnet will be accepted.BPackets within the 10.0.0.0/24 subnet will be rejected.CPackets within the 10.0.0.0/24 subnet will be counted.DPackets within the 10.0.0.0/24 subnet will not be counted.