多选题Users can define policy to control traffic flow between which two components?()Afrom a zone to the device itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface
多选题
Users can define policy to control traffic flow between which two components?()
A
from a zone to the device itself
B
from a zone to the same zone
C
from a zone to a different zone
D
from one interface to another interface
参考解析
解析:
暂无解析
相关考题:
Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface
Which two policy actions are considered flow control actions?() A.rejectB.community addC.next termD.next policy
Refer to the exhibit. A Boston company bought the asse ts of a New York company and is trying to route traffic between the two data networks using EIGRP over EoMPLS. As a network consultant, you were asked to verify the interoperability of the two networks. From the show ip route command output, what can yo u tell the customer about the traffic flow between the subnet in New York (172.16.8.0/24) and the subnets in Boston (172.16.16.0/24 and 10.10.16.0/24)?()A. Traffic is flowing between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0 and no configuration changes are needed.B. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0.C. Traffic will flow between the 172.16.8.0 subnet and 172.16.16.0 without any further configuration changes. However, auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and the 10.10.16.0 subnet.D. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16 .8.0 subnet and the 172.16.16.0 subnet. However, traffic will flow between the 172.16.8.0 subnet and 10.10.16.0 without any further configuration changes.
What Netflow component can be applied to an interface to track IPv4 traffic?() A.flow monitorB.flow recordC.flow samplerD.flow
Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.
What are two step needed to define a QoS policy for a traffic class?()A、determine a minimum bandwidth guaranteeB、determine interfaces to which to apply policyC、assign priorities to the classD、configure access control lists
Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols?()A、Over leased lines,use the multilink ppp command to reduce latency and jitter,and to create Distributed Link Fragmentation and interleaving.B、Use the service-policy command to attach a traffic flow to an interface on the router.C、Use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses,and toguarantee admission of any flows.D、Use the policy-map command to define one or more QoS policies (such as shaping,policing,and so on) to apply to traffic defined by a class map.E、Use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value.F、Use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified.
Which of the following statemets regarding Control Plane Policing (CoPP) is correct?()A、Control Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.B、Control Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.C、Control Plane Policing (CoPP) uses a dedicated "control-plane" command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.D、Control Plane Policing (CoPP) uses "service policy" command under relevant interfaces to filter DOS packet to protect routing packets.E、Control Plane Policing (CoPP) protects the transit management and data traffic through the router.
What Netflow component can be applied to an interface to track IPv4 traffic?()A、flow monitorB、flow recordC、flow samplerD、flow
What are two steps needed to define a QoS policy for a traffic class?()A、 Determine a minimum bandwidth guarantee.B、 Determine interfaces to which to apply policy.C、 Assign priorities to the class.D、 Configure access control lists.
A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able to route to and from VRF_C,which hosts shared services. However,traffic must not be allowed to flow between VRF_A and VRF_B. How can this be accomplished?()A、route redistributionB、import and export using route descriptorsC、import and export using route targetsD、Cisco MPLS Traffic Engineering
What is an advantage of the IntServ QoS model?()A、 It supports admission control that allows a network to reject or downgrade new RSVP sessions if one of the interfaces in the path has reached the limit (that is, all reservable bandwidth is booked).B、 RSVP signals QoS requests per individual flow. In the request the authorized user (authorization object) and needed traffic policy (policy object) are sent. The network can then provide best-effort delivery to these individual flows.C、 RSVP streamlines communication by making it unnecessary to inform network devices of flow parameters (IP addresses and port numbers).D、 Because of the stateful RSVP architecture, continuous signaling does not have to occur.E、 The flow-based approach is scalable to large implementations, such as the public Internet, because RSVP tracks each individual flow.
Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
多选题Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols? ()Aover leased lines, use the multilink ppp command to reduce latency and jitter, and to create Distributed Link Fragmentation and interleavingBuse the service-policy command to attach a traffic flow to an interface on the routerCuse the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses, and to guarantee admission of any flowsDuse the policy-map command to define one or more QoS policies (such as shaping, policing, and so on) to apply to traffic defined by a class mapEuse the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP valueFuse the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified
单选题Which statement about IDS/IPS design is correct?()AAn IPS should be deployed if the security policy does not support the denial of traffic.BAn IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.CAn IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.DBandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
多选题Which two policy actions are considered flow control actions?()ArejectBcommunity addCnext termDnext policy
多选题Which of the following statemets regarding Control Plane Policing (CoPP) is correct?()AControl Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.BControl Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.CControl Plane Policing (CoPP) uses a dedicated control-plane command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.DControl Plane Policing (CoPP) uses service policy command under relevant interfaces to filter DOS packet to protect routing packets.EControl Plane Policing (CoPP) protects the transit management and data traffic through the router.
多选题You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()AConfigure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.BConfigure a security policy that references the unified-access-control captive-portal service.CConfigure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.DConfigure a security policy that references the unified-access-control intranet-controller service.
多选题Which two statements are correct about firewall filters in the Junos OS?()AFirewall filters are stateless.BFirewall filters are used to control routing information that is exchanged between devices.CFirewall filters are used to control traffic passing through the device.DFirewall filters can only be applied to traffic entering the device.
单选题Which of the following definitions can be used to define the term ‘offset ’ as a characteristic of controller action?()AThe period of time in which the set point and the control point coincideBThe periodic change between the set point and the control pointCThe variable difference between the set point and the control pointDThe constant difference between the set point and the control point
多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.
多选题Users can define policy to control traffic flow between which two components?()Afrom a zone to the device itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface
多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.
多选题Which of the following are correct regarding ISDN?()ALegacy DDR can use port information to define interesting traffic.BLegacy DDR can configure multiple dialer configurations on the same interface.CLegacy DDR can use ACLs to define interesting traffic.DHDLC or PPP can be used to encapsulate ISDN D channel information.EThe BRI interfaces on ISDN routers with dialer profiles configured cannot belong to multiple dialer pools.FDialer profiles cannot use extended ACLs to define interesting traffic.
多选题Which four statements about NetFlow are true?()ANetFlow records bidirectional IP traffic flow.BNetFlow export can be implemented over IPv4.CNetFlow export can be implemented over IPv6.DNetFlow records multicast IP traffic flow.ENetFlow records ingress traffic.FNetFlow records egress traffic.
单选题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()AYou must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.BNo security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.CYou must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.DYou must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.