单选题Where do you configure SCREEN options?()Azones on which an attack might arriveBzones you want to protect from attackCinterfaces on which an attack might arriveDinterfaces you want to protect from attack

单选题
Where do you configure SCREEN options?()
A

zones on which an attack might arrive

B

zones you want to protect from attack

C

interfaces on which an attack might arrive

D

interfaces you want to protect from attack


参考解析

解析: 暂无解析

相关考题:

He __ of a city is the fight to protect it from those who attack itA、commandB、captureC、destroyD、defense

Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.A.allowB.preventC.inviteD.get

You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?() A. set security zones management interfaces ge-0/0/0.0B. set zones functional-zone management interfaces ge-0/0/0.0C. set security zones functional-zone management interfaces ge-0/0/0.0D. set security zones functional-zone out-of-band interfaces ge-0/0/0.0

Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?() A.B.C.D.

You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A. from source-portB. from source-addressC. from destination-addressD. from destination-port

You will want two trees about ten feet apart, 选择 Youwillwanttwotreesabouttenfeetapart,from_____tosuspendyourtent.(A)there(C)which(B)them(D)where

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port

You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()A、ExecutableB、TrojanC、VirusD、Worm

You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop

You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()A、[edit interfaces]B、[edit security zones]C、[edit system services]D、[edit security interfaces]

You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()A、Source TCP portB、Source IP addressC、Destination TCP portD、Destination IP address

You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A、set security zones management interfaces ge-0/0/0.0B、set zones functional-zone management interfaces ge-0/0/0.0C、set security zones functional-zone management interfaces ge-0/0/0.0D、set security zones functional-zone out-of-band interfaces ge-0/0/0.0

Where do you configure SCREEN options?()A、zones on which an attack might arriveB、zones you want to protect from attackC、interfaces on which an attack might arriveD、interfaces you want to protect from attack

Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A、the log option for the particular SCREEN optionB、the permit option for the particular SCREEN optionC、the SCREEN option, because it does not drop traffic by defaultD、the alarm-without-drop option for the particular SCREEN option

In which case would you use a FULL OUTER JOIN?()A、Both tables have NULL values.B、You want all unmatched data from one table.C、You want all matched data from both tables.D、You want all unmatched data from both tables.E、One of the tables has more data than the other.F、You want all matched and unmatched data from only one table.

In which scenario will you use the Flashback Version Query feature?()A、 when you want to restore a table that has been dropped from the Recycle BinB、 when you want to identify the transaction ID of the transaction that deleted some important records from a tableC、 when you want to recover the schema of a dropped userD、when you want to restore a dropped tablespace

You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()A、Utility ManagerB、Accessibility WizardC、Accessibility Options icon in Control PanelD、Users and Passwords icon in Control Panel

单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()Afrom source-portBfrom source-addressCfrom destination-addressDfrom destination-port

单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()ASource TCP portBSource IP addressCDestination TCP portDDestination IP address

单选题You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()Athen rejectBthen discardCthen next filterDthen silent-drop

单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()Athe log option for the particular SCREEN optionBthe permit option for the particular SCREEN optionCthe SCREEN option, because it does not drop traffic by defaultDthe alarm-without-drop option for the particular SCREEN option

单选题You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()Aset security zones management interfaces ge-0/0/0.0Bset zones functional-zone management interfaces ge-0/0/0.0Cset security zones functional-zone management interfaces ge-0/0/0.0Dset security zones functional-zone out-of-band interfaces ge-0/0/0.0

单选题You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()ASQL*PlusBiSQL*PlusCManagement ServerDManagement RepositoryEOracle Enterprise Manager 10g Database Control

单选题You must configure a SCREEN option that would protect your device from a session table flood.Which configuration meets this requirement?()A AB BC CD D

单选题In which scenario will you use the Flashback Version Query feature?()A when you want to restore a table that has been dropped from the Recycle BinB when you want to identify the transaction ID of the transaction that deleted some important records from a tableC when you want to recover the schema of a dropped userDwhen you want to restore a dropped tablespace

单选题You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()A[edit interfaces]B[edit security zones]C[edit system services]D[edit security interfaces]