单选题Which zone type can be specified in a policy?()AsecurityBfunctionalCuserDsystem

单选题
Which zone type can be specified in a policy?()
A

security

B

functional

C

user

D

system


参考解析

解析: 暂无解析

相关考题:

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

Which zone type can be specified in a policy?() A.securityB.functionalC.userD.system

Which zone is system-defined?() A.securityB.functionalC.junos-globalD.management

Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface

A network vulnerability scanner is part of which critical element of network and system security?() A. host securityB. perimeter securityC. security monitoringD. policy management

Which of the following is NOT a security feature relating to user accounts?()A、Some commands can be password protected requiring logged in customers to re-enter their password.B、A user account can be disabled automatically, after a specified number of invalid login attempts.C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E、Logged in customers can be logged off of the system after a specified period of inactivity.

Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevantB、The action is specified in a then statementC、Ters are optional in a policyD、The match condition can be identified with a from statementE、Every policy must contain at least one term

A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management

Which command will allow you to display the configured QoS group and the ingress buffer allocated to each QoS group?()A、 show interface priority-flow-controlB、 show interface queuingC、 show queuing interfaceD、 show policy-map system type queuingE、 show policy-map interface ethernet  type queuing

Users can define policy to control traffic flow between which two components?()A、from a zone to the device itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

Which three statements are true about terms in a policy?()A、The order of the terms in a policy is irrelevant.B、The action is specified in a then statement.C、Terms are optional in a policy.D、The match condition can be identified with a from statement.E、A from statement is mandatory in a term.

Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

Which zone type can be specified in a policy?()A、securityB、functionalC、userD、system

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

Regarding zone types, which statement is true?()A、You cannot assign an interface to a functional zone.B、You can specifiy a functional zone in a security policy.C、Security zones must have a scheduler applied.D、You can use a security zone for traffic destined for the device itself.

Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()A、Policy violations are prioritized as High, Medium, or Informational by category B、Policies can be disabled completely, or flagged as ignored, for the specified target C、Policies can be flagged as ignored, but never completely disabled, for the specified targetD、Policy violations must be corrected, otherwise the database will shut down until corrective action occurs

Which three statements are true regarding the data types in Oracle Database 10g/11g?()A、Only one LONG column can be used per table B、A TIMESTAMP data type column stores only time values with fractional seconds C、The BLOB data type column is used to store binary data in an operating system file D、The minimum column width that can be specified for a VARCHAR2 data type column is one E、The value for a CHAR data type column is blank-padded to the maximum defined column width

单选题Which of the following is NOT a security feature relating to user accounts?()ASome commands can be password protected requiring logged in customers to re-enter their password.BA user account can be disabled automatically, after a specified number of invalid login attempts.CAn account can have multiple valid passwords at the same time, any of which can be used to access the account.DThe password policy feature can allow the system to require passwords to include a minimum number of numeric characters.ELogged in customers can be logged off of the system after a specified period of inactivity.

多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevantBThe action is specified in a then statementCTers are optional in a policyDThe match condition can be identified with a from statementEEvery policy must contain at least one term

多选题Which three statements are true regarding the data types in Oracle Database 10g/11g?()AOnly one LONG column can be used per tableBA TIMESTAMP data type column stores only time values with fractional secondsCThe BLOB data type column is used to store binary data in an operating system fileDThe minimum column width that can be specified for a VARCHAR2 data type column is oneEThe value for a CHAR data type column is blank-padded to the maximum defined column width

多选题Which three statements are true about terms in a policy?()AThe order of the terms in a policy is irrelevant.BThe action is specified in a then statement.CTerms are optional in a policy.DThe match condition can be identified with a from statement.EA from statement is mandatory in a term.

单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()AIt enables an attacker to perform an IP sweep of devices.BIt enables a hacker to know which operating system the system is running.CIt can overflow the session table to its limit, which can result in rejection of legitimate traffic.DIt creates a ping of death and can cause the entire network to be infected with a virus.

单选题A network vulnerability scanner is part of which critical element of network and system security?()A host securityB perimeter securityC security monitoringD policy management

单选题Regarding zone types, which statement is true?()AYou cannot assign an interface to a functional zone.BYou can specifiy a functional zone in a security policy.CSecurity zones must have a scheduler applied.DYou can use a security zone for traffic destined for the device itself.

单选题Which zone type can be specified in a policy?()AsecurityBfunctionalCuserDsystem

单选题Which type of zone is used by traffic transiting the device?()Atransit zoneBdefault zoneCsecurity zoneDfunctional zone

单选题Which zone is a system-defined zone?()Anull zoneBtrust zoneCuntrust zoneDmanagement zone

单选题Which command will allow you to display the configured QoS group and the ingress buffer allocated to each QoS group?()A show interface priority-flow-controlB show interface queuingC show queuing interfaceD show policy-map system type queuingE show policy-map interface ethernet  type queuing