多选题You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()AVPN TrafficBDNS TrafficCLDAP TrafficDHTTP TrafficEHTTPS TrafficFTraffic from the network address of 192.168.10/24

多选题
You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()
A

VPN Traffic

B

DNS Traffic

C

LDAP Traffic

D

HTTP Traffic

E

HTTPS Traffic

F

Traffic from the network address of 192.168.10/24


参考解析

解析: 暂无解析

相关考题:

What is a Host Enforcer policy?() A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A. You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B. No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C. You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D. You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS

A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? () A. inbound traffic transiting the routerB. outbound traffic transiting the routerC. traffic destined to the Routing EngineD. traffic destined to the interface address on which the filter is applied

You have a computer that runs Windows Vista.You need to prevent all inbound traffic to your computer without being notified.What should you do?() A.AB.BC.CD.D

You need to identify if malware is causing performance issues on your computer.What should you do?() A.AB.BC.CD.D

What are two characteristics of the SLB One-arm mode? ()A、 It is not as common as bridge modeB、 The MSFC is not directly connected to the CSMC、 Outbound traffic from servers may need to be directed by PBR or CSNAT to the CSMD、 The SLB is moved to a position where selected inbound and outbound server traffic goesthrough the SLBE、 The CSM statically routes inbound server traffic to the aggregation switch FWSM, then to the connected server subnet

What is a Host Enforcer policy?()A、A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B、A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C、A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.D、A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

A Windows Azure application is activated for Windows Azure Connect A corporate policy blocks Internet traffic for local servers.  You need to recommend the firewall rule that will allow Windows Azure Connect traffic for local servers.  What should you recommend?()A、 Allow TCP port 443 inbound.B、 Allow TCP port 3389 outbound.C、 Allow TCP port 3389 inbound.D、 Allow TCP port 443 outbound.

You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()A、[edit security policies from-zone HR to-zone HR]B、[edit security zones functional-zone management protocols]C、[edit security zones protocol-zone HR host-inbound-traffic]D、[edit security zones security-zone HR host-inbound-traffic protocols]

On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()A、SMTPB、DNSC、FTPD、TelnetE、HTTPF、POP3

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

You are working with a client to classify the different types of application traffic they will have on their network and to assign a QoS value to each traffic flow. The client has identified the following applications: Internet traffic, Oracle, network-based backups, AOL Instant Messenger, IP routing, voice, and voice signaling. Given these types of applications, how many different classes will need to be configured in QoS?()A、8B、6C、9D、5

A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? ()A、inbound traffic transiting the routerB、outbound traffic transiting the routerC、traffic destined to the Routing EngineD、traffic destined to the interface address on which the filter is applied

You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()A、 VPN TrafficB、 DNS TrafficC、 LDAP TrafficD、 HTTP TrafficE、 HTTPS TrafficF、 Traffic from the network address of 192.168.10/24

You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

Your computer has Microsoft Windows Firewall enabled.  Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic.  You need to prevent your child from playing this game.  What should you do? ()A、Enable the User Account Control feature.B、Configure the user account of your child as a standard user.C、Create an outbound rule in Windows Firewall to block UDP port 5678.D、Create an outbound rule in Windows Firewall to block TCP port 5678.

You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

单选题What is a Host Enforcer policy?()AA policy that is defined on the endpoint that permits or denies inbound or outbound traffic.BA policy that is sent to the endpoint that permits or denies inbound or outbound traffic.CA policy that is sent to the protected resource that permits or denies inbound or outbound traffic.DA policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

多选题What are two characteristics of the SLB One-arm mode? ()AIt is not as common as bridge modeBThe MSFC is not directly connected to the CSMCOutbound traffic from servers may need to be directed by PBR or CSNAT to the CSMDThe SLB is moved to a position where selected inbound and outbound server traffic goesthrough the SLBEThe CSM statically routes inbound server traffic to the aggregation switch FWSM, then to the connected server subnet

多选题On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()ASMTPBDNSCFTPDTelnetEHTTPFPOP3

单选题You have a computer that runs Windows 7. You need to identify which hardware is required to create a system repair disc.  Which hardware should you identify?()ACD/DVD burnerBfloppy diskCtape driveDUSB disk

单选题Which class-of-service component allows you to define the bandwidth allocated to different traffic types?()AclassificationBrewrite markingCschedulingDqueuing

单选题Your company has a new server that runs Windows Server 2008. The Web Server (IIS) role is installed.  Your company hosts a public Web site. You notice unusually high traffic volume on the Web site. You need to identify the source of the traffic. What should you do?()AEnable the Web scripting option.BRun the netstat Can command on the server.CCreate a custom view in Event Viewer to filter information from the security log.DEnable Web site logging in the IIS Server Manager and filter the logs for the source IP address.

单选题You need to identify which tool the help desk users must use to perform administrative tasks.  Which tool should you identify?()ARemoteAppBRemote AssistanceCRemote DesktopDRemote Server Administration Tools (RSAT)

单选题A Windows Azure application is activated for Windows Azure Connect A corporate policy blocks Internet traffic for local servers.  You need to recommend the firewall rule that will allow Windows Azure Connect traffic for local servers.  What should you recommend?()A Allow TCP port 443 inbound.B Allow TCP port 3389 outbound.C Allow TCP port 3389 inbound.D Allow TCP port 443 outbound.

单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B Allow all inbound VPN traffic to pass through the perimeter firewall only.C Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.