Which two steps are performed when configuring a zone?()A、Define a default policy for the zone.B、Assign logical interfaces to the zone.C、Assign physical interfaces to the zone.D、Define the zone as a security or functional zone

题目

Which two steps are performed when configuring a zone?()

  • A、Define a default policy for the zone.
  • B、Assign logical interfaces to the zone.
  • C、Assign physical interfaces to the zone.
  • D、Define the zone as a security or functional zone

相似考题
更多“Which two steps are performed when configuring a zone?()A、Define a default policy for the zone.B、Assign logical interfaces to the zone.C、Assign physical interfaces to the zone.D、Define the zone as a security or functional zone”相关问题
  • 第1题:

    What are two step needed to define a QoS policy for a traffic class?()

    • A、determine a minimum bandwidth guarantee
    • B、determine interfaces to which to apply policy
    • C、assign priorities to the class
    • D、configure access control lists

    正确答案:A,C

  • 第2题:

    What are two steps needed to define a QoS policy for a traffic class?()

    • A、 Determine a minimum bandwidth guarantee.
    • B、 Determine interfaces to which to apply policy.
    • C、 Assign priorities to the class.
    • D、 Configure access control lists.

    正确答案:A,C

  • 第3题:

    Which two statements describe the purpose of a security policy?()

    • A、It enables traffic counting and logging.
    • B、It enforces a set of rules for transit traffic.
    • C、It controls host inbound services on a zone.
    • D、It controls administrator rights to access the device.

    正确答案:A,B

  • 第4题:

    Users can define policy to control traffic flow between which two components?()

    • A、from a zone to the device itself
    • B、from a zone to the same zone
    • C、from a zone to a different zone
    • D、from one interface to another interface

    正确答案:B,C

  • 第5题:

    Regarding secure tunnel (st) interfaces, which statement is true?()

    • A、You cannot assign st interfaces to a security zone.
    • B、You cannot apply static NAT on an st interface logical unit.
    • C、st interfaces are optional when configuring a route-based VPN
    • D、A static route can reference the st interface logical unit as the next-hop

    正确答案:D

  • 第6题:

    Users can define policy to control traffic flow between which two components? ()(Choose two.)

    • A、from a zone to the router itself
    • B、from a zone to the same zone
    • C、from a zone to a different zone
    • D、from one interface to another interface

    正确答案:B,C

  • 第7题:

    Regarding zone types, which statement is true?()

    • A、You cannot assign an interface to a functional zone.
    • B、You can specifiy a functional zone in a security policy.
    • C、Security zones must have a scheduler applied.
    • D、You can use a security zone for traffic destined for the device itself.

    正确答案:D

  • 第8题:

    Your  company,  A.  Datum  Corporation,  has  a  single  Active  Directory  domain  named  intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2  operating system. The domain controllers also run DNS servers.  The intranet.adatum.com DNS zone is configured as an Active Directoryintegrated zone with the  Dynamic updates setting configured to Secure only.  A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by  domain controllers or member servers.  You need to configure the intranet.adatum.com zone to meet the new security policy requirement.  Which two actions should you perform()

    • A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone  properties.
    • B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com  DNS zone properties.
    • C、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab  of the intranet.adatum.com DNS zone properties.
    • D、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security  tab of the intranet.adatum.com DNS zone properties.

    正确答案:A,D

  • 第9题:

    Your company has two domain controllers that are configured as internal DNS servers. All zones on  The safer , easier way to help you pass any IT exams.  6 / 90   the DNS servers are Active Directory-integrated zones. The zones allow all dynamic updates.    You discover that the contoso.com zone has multiple entries for the host names of computers that do not  exist.   You need to configure the contoso.com zone to automatically remove expired records.  What should you do() 

    • A、Enable only secure updates on the contoso.com zone.
    • B、Enable scavenging and configure the refresh interval on the contoso.com zone.
    • C、From the Start of Authority tab, decrease the default refresh interval on the contoso.com zone.
    • D、From the Start of Authority tab, increase the default expiration interval on the contoso.com zone.

    正确答案:B

  • 第10题:

    单选题
    Which statement describes a security zone?()
    A

    A security zone can contain one or more interfaces.

    B

    A security zone can contain interfaces in multiple routing instances.

    C

    A security zone must contain two or more interfaces.

    D

    A security zone must contain bridge groups.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Regarding zone types, which statement is true?()
    A

    You cannot assign an interface to a functional zone.

    B

    You can specifiy a functional zone in a security policy.

    C

    Security zones must have a scheduler applied.

    D

    You can use a security zone for traffic destined for the device itself.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Regarding secure tunnel (st) interfaces, which statement is true?()
    A

    You cannot assign st interfaces to a security zone.

    B

    You cannot apply static NAT on an st interface logical unit.

    C

    st interfaces are optional when configuring a route-based VPN

    D

    A static route can reference the st interface logical unit as the next-hop


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which type of zone is used by traffic transiting the device?()

    • A、transit zone
    • B、default zone
    • C、security zone
    • D、functional zone

    正确答案:C

  • 第14题:

    In the Junos OS, which statement is true?()

    • A、vlan.0 belongs to the untrust zone.
    • B、You must configure Web authentication to allow inbound traffic in the untrust zone.
    • C、The zone name "untrust" has no special meaning.
    • D、The untrust zone is not configurable.

    正确答案:C

  • 第15题:

    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

    • A、[edit security idp]
    • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
    • C、[edit security zones security-zone trust]
    • D、[edit security screen]

    正确答案:B,C

  • 第16题:

    Which statement describes a security zone?()

    • A、A security zone can contain one or more interfaces.
    • B、A security zone can contain interfaces in multiple routing instances.
    • C、A security zone must contain two or more interfaces.
    • D、A security zone must contain bridge groups.

    正确答案:A

  • 第17题:

    You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()

    • A、set security zones management interfaces ge-0/0/0.0
    • B、set zones functional-zone management interfaces ge-0/0/0.0
    • C、set security zones functional-zone management interfaces ge-0/0/0.0
    • D、set security zones functional-zone out-of-band interfaces ge-0/0/0.0

    正确答案:C

  • 第18题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    • A、Traffic is permitted from the trust zone to the untrust zone.
    • B、Intrazone traffic in the trust zone is permitted.
    • C、All traffic through the device is denied.
    • D、The policy is matched only when no other matching policies are found.

    正确答案:C,D

  • 第19题:

    Your company, A. Datum Corporation, has a single Active Directory domain named intranet.adatum.com. The  domain has two domain controllers that run Windows Server 2008 R2 operating system. The  domain controllers also run DNS servers.   The intranet.adatum.com DNS zone is configured as an Active Directory-integrated zone with the  Dynamic updates setting configured to Secure only. A new corporate security policy requires that  the intranet.adatum.com DNS zone must be updated only by domain controllers or member  servers.   You need to configure the intranet.adatum.com zone to meet the new security policy requirement.     Which two actions should you perform()

    • A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone properties.
    • B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com DNS zone prop
    • C、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab of the intrane
    • D、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security tab of the int

    正确答案:A,D

  • 第20题:

    Your company has two domain controllers that are configured as internal DNS servers. All zones  on the DNS servers are Active Directory-integrated zones. The zones allow all dynamic updates.  You discover that the contoso.com zone has multiple entries for the host names of computers  that do not exist.     You need to configure the contoso.com zone to automatically remove expired records.     What should you do()

    • A、Enable only secure updates on the contoso.com zone.
    • B、Enable scavenging and configure the refresh interval on the contoso.com zone.
    • C、From the Start of Authority tab, decrease the default refresh interval on the contoso.com zone.
    • D、From the Start of Authority tab, increase the default expiration interval on the contoso.com zone.

    正确答案:B

  • 第21题:

    多选题
    What are two steps needed to define a QoS policy for a traffic class?()
    A

    Determine a minimum bandwidth guarantee.

    B

    Determine interfaces to which to apply policy.

    C

    Assign priorities to the class.

    D

    Configure access control lists.


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    多选题
    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
    A

    [edit security idp]

    B

    [edit security zones security-zone trust interfaces ge-0/0/0.0]

    C

    [edit security zones security-zone trust]

    D

    [edit security screen]


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two steps are performed when configuring a zone?()
    A

    Define a default policy for the zone.

    B

    Assign logical interfaces to the zone.

    C

    Assign physical interfaces to the zone.

    D

    Define the zone as a security or functional zone


    正确答案: D,B
    解析: 暂无解析