Which two statements are true when source/destination filters are enabled? ()(Choose two.) A. Excluded traffic is not accelerated.B. Excluded traffic is only compressed.C. Source/destination filter applies to all traffic sent from LAN to WAN.D. Source/destination filters work in packet interception mode using RIPv2.

Which two statements are true when source/destination filters are enabled? ()(Choose two.)

A. Excluded traffic is not accelerated.

B. Excluded traffic is only compressed.

C. Source/destination filter applies to all traffic sent from LAN to WAN.

D. Source/destination filters work in packet interception mode using RIPv2.


相关考题:

下列CASE语句中执行结果不为空的是() A、SELECTCASEWHEN125THEN'true'ELSE'false'END;B、SELECTCASEBINARY'B'WHEN'a'THEN1WHEN'b'THEN2END;C、SELECTCASEWHEN-10THEN'true'END;D、SELECTCASE'one'WHEN1THEN'one'WHEN2THEN'two'END;

[A] which [B] that [C] what [D] when

以下程序段的输出结果为 ( )int j=2;switch(j){case 2:System.out.print("two.");case 2+1:System.out.println("three.");breakdefault:System.out.println("value is"+j);break;}A.two.three.B.two.C.three.D.value is 2

WhichofthefollowingparametersdefinesthelocationwhereOracleshouldcreatearchivedredologs?() A.LOG_ARCHIVE_1B.LOG_DESTINATION_1C.LOG_ARCHIVED_DESTINATION_1D.LOG_ARCHIVE_DEST_1E.LOG_ARCHIVE_SOURCE_1

Which configuration shows the correct application of a security policy scheduler?() A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } scheduler-name now; } } }B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }C. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn scheduler-name now; } } } }D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; scheduler-name now; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }myTunnel;

Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }C. [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }

A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone.Which configuration statement would correctly accomplish this task?()A. from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C. from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

WhichofthefollowingareassociatedwiththeapplicationlayeroftheOSImodel?(two.)() A.pingB.TelnetC.FTPD.TCPE.IP

[A] who [B] when [C] where [D] which

The beautiful mountain village__________ we spent our holiday last year is locatedin __________ is now part of Guangxi.A.which ; whereB.where; whatC.that ; whatD.when ; which