多选题What are three terminating actions for firewall filters?()ArejectBdropCpermitDacceptEdiscard

多选题
What are three terminating actions for firewall filters?()
A

reject

B

drop

C

permit

D

accept

E

discard


参考解析

解析: 暂无解析

相关考题:

What are three firewall filter terminating actions?() A. acceptB. logC. rejectD. discardE. drop

Which two statements are correct about firewall filters in the Junos OS?() A. Firewall filters are stateless.B. Firewall filters are used to control routing information that is exchanged between devices.C. Firewall filters are used to control traffic passing through the device.D. Firewall filters can only be applied to traffic entering the device.

What is the default action for firewall filters?() A. acceptB. rejectC. discardD. log

A routing policy has three terms and the first term of the policy does not contain a terminating action. What will become of the routes after they have been evaluated by the first term?() A.In the absence of a terminating action, all routes are accepted.B.The route will be evaluated by the second term in the policy.C.The default action will be applied.D.In the absence of a termination action, all routes are rejected.

What is the recommended practice when considering VPN termination and firewall placement?() A. have the firewall and VPN appliance deployed in parallelB. place the VPN in line with the firewall, with the VPN terminating inside the firewallC. place the public side of the VPN termination device in the DMZ behind a firewallD. place the VPN in line with the firewall, with the VPN terminating outside the firewall

What methods are available to create separate multicast and unicast forwarding topologies on a Juniper Networks router?()A、MBGPB、RIB groupsC、Routing policyD、Firewall filters

What are three firewall filter terminating actions?()A、acceptB、logC、rejectD、discardE、drop

A routing policy has three terms and the first term of the policy does not contain a terminating action. What will become of the routes after they have been evaluated by the first term?()A、In the absence of a terminating action, all routes are accepted.B、The route will be evaluated by the second term in the policy.C、The default action will be applied.D、In the absence of a termination action, all routes are rejected.

What is the default action for firewall filters?()A、acceptB、rejectC、discardD、log

What are three applications for firewall filters in JUNOS software?()A、route filteringB、protect the routing engineC、securing the router control planeD、protect against hidden bridge loopsE、protect against denial of service attacks

What are two characteristics of multi-filed classification?()A、Implemented with firewall filters.B、Typically configured on core routers.C、Typically configured on customer facing routers.D、Implemented with Behavior Aggregate (BA) classification.

What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()A、IP addressB、MAC addressC、protocolD、portE、session ID

Firewall filters can perform which two actions?()A、Log packet.B、Count packet.C、Set packet metric.D、Decrement packet TTL.E、Change destination IP address.

What are three terminating actions for firewall filters?()A、rejectB、dropC、permitD、acceptE、discard

Firewall filters can perform which two actions?()A、Log packets.B、Set packet metrics.C、Count packets.D、Decrement packet's TTL value.

多选题What are three features of the Cisco IOS Firewall feature set?()Anetwork-based application recognition (NBAR)Bauthentication proxyCstateful packet filteringDAAA servicesEproxy serverFIPS

多选题What are three firewall filter terminating actions?()AacceptBlogCrejectDdiscardEdrop

多选题What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()AIP addressBMAC addressCprotocolDportEsession ID

多选题Firewall filters can be used to accept, discard, or reject packets based on ()Aprotocol typeBMAC addressCTCP or UDP portDsource and destination IP address

多选题What are three applications for firewall filters in JUNOS software?()Aroute filteringBprotect the routing engineCsecuring the router control planeDprotect against hidden bridge loopsEprotect against denial of service attacks

多选题Which two statements are correct about firewall filters in the Junos OS?()AFirewall filters are stateless.BFirewall filters are used to control routing information that is exchanged between devices.CFirewall filters are used to control traffic passing through the device.DFirewall filters can only be applied to traffic entering the device.

多选题What are two characteristics of multi-filed classification?()AImplemented with firewall filters.BTypically configured on core routers.CTypically configured on customer facing routers.DImplemented with Behavior Aggregate (BA) classification.

单选题What is the recommended practice when considering VPN termination and firewall placement?()A have the firewall and VPN appliance deployed in parallelB place the VPN in line with the firewall, with the VPN terminating inside the firewallC place the public side of the VPN termination device in the DMZ behind a firewallD place the VPN in line with the firewall, with the VPN terminating outside the firewall

多选题What are three terminating actions for firewall filters?()ArejectBdropCpermitDacceptEdiscard

多选题Firewall filters can perform which two actions?()ALog packets.BSet packet metrics.CCount packets.DDecrement packet's TTL value.

多选题Firewall filters can perform which two actions?()ALog packet.BCount packet.CSet packet metric.DDecrement packet TTL.EChange destination IP address.

多选题Which three advanced permit actions within security policies are valid?() (Choose three.)AMark permitted traffic for firewall user authentication.BMark permitted traffic for SCREEN options.CAssociate permitted traffic with an IPsec tunnel.DAssociate permitted traffic with a NAT rule.EMark permitted traffic for IDP processing.