多选题What are three applications for firewall filters in JUNOS software?()Aroute filteringBprotect the routing engineCsecuring the router control planeDprotect against hidden bridge loopsEprotect against denial of service attacks

多选题
What are three applications for firewall filters in JUNOS software?()
A

route filtering

B

protect the routing engine

C

securing the router control plane

D

protect against hidden bridge loops

E

protect against denial of service attacks


参考解析

解析: 暂无解析

相关考题:

What are three configuration objects used to build Junos IDP rules? ()(Choose three.) A. zone objectsB. policy objectsC. attack objectsD. alert and notify objectsE. network and address objects

What are three benefits of IF-MAP Federation?() A. Enables seamless access for remote access users to firewall enforcer protected resources.B. Scales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.C. Enables dynamic configuration synchronization across multiple MAG Series devices.D. Provides a substitute for WAN clustering among geographically separated MAG Series devices.E. Shares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.

What is a type of firewall enforcer supported by the Junos Pulse Access Control Service?() A. Checkpoint firewallB. SRX Series deviceC. DP sensorD. MX Series device

What are three firewall filter terminating actions?() A. acceptB. logC. rejectD. discardE. drop

What is the default action for firewall filters?() A. acceptB. rejectC. discardD. log

What methods are available to create separate multicast and unicast forwarding topologies on a Juniper Networks router?()A、MBGPB、RIB groupsC、Routing policyD、Firewall filters

What is one benefit of the Cisco anti-X defense strategy?()A、 applications securityB、 virtual firewall protectionC、 security events correlation for proactive responseD、 malware, virus, and worm mitigation

What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()A、IP addressB、MAC addressC、protocolD、portE、session ID

Which two statements are correct about firewall filters in the Junos OS?()A、Firewall filters are stateless.B、Firewall filters are used to control routing information that is exchanged between devices.C、Firewall filters are used to control traffic passing through the device.D、Firewall filters can only be applied to traffic entering the device.

What are three firewall filter terminating actions?()A、acceptB、logC、rejectD、discardE、drop

What are three applications for firewall filters in JUNOS software?()A、route filteringB、protect the routing engineC、securing the router control planeD、protect against hidden bridge loopsE、protect against denial of service attacks

What are three terminating actions for firewall filters?()A、rejectB、dropC、permitD、acceptE、discard

Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A、to specify the destination addresses to which access is permittedB、to specify the source address permitted to access the resourceC、to specify the services to which access is permittedD、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

Which three JUNOS software features allow for increased security on your network?()A、firewall filtersB、data encryptionC、routing protocol authenticationD、support for BGP path mtu discoveryE、automatic discovery for IPSEC neighbors

What are three configuration objects used to build JUNOS IDP rules?()A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

多选题What are three firewall filter terminating actions?()AacceptBlogCrejectDdiscardEdrop

单选题What is the default action for firewall filters?()AacceptBrejectCdiscardDlog

多选题What are two characteristics of multi-filed classification?()AImplemented with firewall filters.BTypically configured on core routers.CTypically configured on customer facing routers.DImplemented with Behavior Aggregate (BA) classification.

多选题What are three valid match criteria in a firewall filter applied to a Layer 3 interface?()AIP addressBMAC addressCprotocolDportEsession ID

多选题What are three configuration objects used to build JUNOS IDP rules?()Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

多选题Which two statements are correct about firewall filters in the Junos OS?()AFirewall filters are stateless.BFirewall filters are used to control routing information that is exchanged between devices.CFirewall filters are used to control traffic passing through the device.DFirewall filters can only be applied to traffic entering the device.

多选题What are three configuration objects used to build Junos IDP rules? ()(Choose three.)Azone objectsBpolicy objectsCattack objectsDalert and notify objectsEnetwork and address objects

单选题What is a type of firewall enforcer supported by the Junos Pulse Access Control Service?()ACheckpoint firewallBSRX Series deviceCDP sensorDMX Series device

多选题What are three benefits of IF-MAP Federation?()AEnables seamless access for remote access users to firewall enforcer protected resources.BScales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.CEnables dynamic configuration synchronization across multiple MAG Series devices.DProvides a substitute for WAN clustering among geographically separated MAG Series devices.EShares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.

多选题What are three terminating actions for firewall filters?()ArejectBdropCpermitDacceptEdiscard