Which firewall best practices can help mitigate worm and other automated attacks?()A、Segment security zonesB、Restrict access to firewallsC、Use logs and alertsD、Set connection limits
Which firewall best practices can help mitigate worm and other automated attacks?()
- A、Segment security zones
- B、Restrict access to firewalls
- C、Use logs and alerts
- D、Set connection limits
相关考题:
Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?() A. Proper placement depends on the VLAN assignment.B. Place it outside the firewall.C. Place it inside the firewall to make design and management easier.D. Place it inside the firewall with multiple context modes connecting to all configured contexts.
It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A、 single layer of firewallingB、 multiple layers of firewallingC、 firewall connections in either an active or standby stateD、 an architecture in which all traffic between firewalls goes through application-specific servers
What is meant by the term "firewall sandwich"?()A、multiple layers of firewallingB、a method of operating firewalls from multiple vendorsC、firewall connections in either an active or standby stateD、an architecture in which all traffic between firewalls goes through application-specific serversE、an architecture in which all traffic between firewalls goes through application-specific gateways
Which three statements about firewall modes are correct? ()A、 A firewall in routed mode has one IP addressB、 A firewall in transparent mode has one IP addressC、 In routed mode, the firewall is considered to be a Layer 2 dewD、 In routed mode, the firewall is considered to be a Layer 3 deviceE、 In transparent mode, the firewall is considered to be a Layer 2 deviceF、 In transparent mode, the firewall is considered to be a Layer 3 device
Which two statements are true about firewall filter configurations?()A、Multiple action modifiers can be included in the same term.B、Only a single action modifier can be included in the same term.C、The default term within a firewall filter uses the discard action.D、The default term within a firewall filter uses the reject action.
Which two statements are correct about firewall filters in the Junos OS?()A、Firewall filters are stateless.B、Firewall filters are used to control routing information that is exchanged between devices.C、Firewall filters are used to control traffic passing through the device.D、Firewall filters can only be applied to traffic entering the device.
Which two firewall filter actions will terminate the processing and evaluation of a packet?()A、permitB、acceptC、denyD、discard
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()A、fewer devices to manageB、moderate-to-high scalabilityC、stateful inspection of decrypted VPN trafficD、increased bandwidth with additional interfacesE、decreased complexity as traffic is filtered from the firewall
What is a virtual firewall?()A、another name for a firewall deployed in routed modeB、another name for a firewall deployed in transparent modeC、a separation of multiple firewall security contexts on a single firewallD、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A、 inline with a firewallB、 in a DMZ outside the firewallC、 parallel with a firewallD、 in a DMZ behind the firewall
Which of the following features is essential in a firewall if it is to support RTP sessions?()A、Remote consoleB、StatefulnessC、Address translationD、Zones
Which of the following should be flashed on a firewall to make sure it is the most current version available?()A、FirmwareB、ACLsC、DefinitionsD、Route lists
A technician needs to check which ports are open in the Windows Firewall. Which of the following willallow the technician to view these settings?()A、netsh firewall show loggingB、ipconfig /allC、netsh firewall show stateD、arp -a
A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()A、The application server,firewall,and database server on the same VLANB、The application server and firewall on one VLAN,and the database server on a second VLANC、The application server on one VLAN,and the database server and firewall on a second VLAND、The application server and firewall on one VLAN,and the firewall and database server on a second VLAN
Under which configuration hierarchy is an access profile configured for firewall user authentication?()A、[edit access]B、[edit security access]C、[edit firewall access]D、[edit firewall-authentication]
Which statement accurately describes firewall user authentication?()A、Firewall user authentication provides another layer of security in a network.B、Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C、Firewall user authentication enables session-based forwarding.D、Firewall user authentication is used as a last resort security method in a network.
单选题What is a virtual firewall?()Aanother name for a firewall deployed in routed modeBanother name for a firewall deployed in transparent modeCa separation of multiple firewall security contexts on a single firewallDa firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextEa firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
多选题Which three statements about firewall modes are correct? ()AA firewall in routed mode has one IP addressBA firewall in transparent mode has one IP addressCIn routed mode, the firewall is considered to be a Layer 2 dewDIn routed mode, the firewall is considered to be a Layer 3 deviceEIn transparent mode, the firewall is considered to be a Layer 2 deviceFIn transparent mode, the firewall is considered to be a Layer 3 device
单选题Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()AStateful firewallBProxy firewallCPacket filtering firewallDStateless firewall
多选题Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()Aonboard VPN acceleratorBevents correlation and proactive responseChigh-performance AIM VPN modulesDvirtual firewallECisco lOS Firewall and lOS IPSFtransparent firewall
多选题Which two traffic types trigger pass-through firewall user authentication?()ASSHBTelnetCICMPDOSPFEHTTP
单选题A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()AThe application server,firewall,and database server on the same VLANBThe application server and firewall on one VLAN,and the database server on a second VLANCThe application server on one VLAN,and the database server and firewall on a second VLANDThe application server and firewall on one VLAN,and the firewall and database server on a second VLAN
单选题It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A single layer of firewallingB multiple layers of firewallingC firewall connections in either an active or standby stateD an architecture in which all traffic between firewalls goes through application-specific servers
多选题Which two firewall user authentication objects can be referenced in a security policy?()Aaccess profileBclient groupCclientDdefault profile
单选题By default, which command can be used to display information about packets that have been logged with the syslog firewall filter action?()Ashow logBshow firewallCshow log messagesDshow firewall log
单选题Under which configuration hierarchy is an access profile configured for firewall user authentication?()A[edit access]B[edit security access]C[edit firewall access]D[edit firewall-authentication]
多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history
多选题Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()Afewer devices to manageBmoderate-to-high scalabilityCstateful inspection of decrypted VPN trafficDincreased bandwidth with additional interfacesEdecreased complexity as traffic is filtered from the firewall