Users can define policy to control traffic flow between which two components?()
第1题:
A. The untrust zone does not have a management policy configured.
B. The trust zone does not have ping enabled as host-inbound-traffic service.
C. The security policy from the trust zone to the untrust zone does not permit ping.
D. No security policy exists for the ICMP reply packet from the untrust zone to the trust zone.
第2题:
Which statement best describes Cisco IOS Zone-Based Policy Firewall?()
第3题:
Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
第4题:
A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()
第5题:
You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
第6题:
Users can define policy to control traffic flow between which two components? ()(Choose two.)
第7题:
Regarding zone types, which statement is true?()
第8题:
is between the scheme and the nearest land
contains all the traffic moving in one direction
is designated as an anchorage area
separates traffic proceeding in one direction from traffic proceeding in the opposite direction
第9题:
It controls inter-zone traffic.
It controls intra-zone traffic.
It is named with a system-defined name.
It controls traffic destined to the device's ingress interface.
第10题:
from a zone to the device itself
from a zone to the same zone
from a zone to a different zone
from one interface to another interface
第11题:
[edit security policies from-zone HR to-zone HR]
[edit security zones functional-zone management protocols]
[edit security zones protocol-zone HR host-inbound-traffic]
[edit security zones security-zone HR host-inbound-traffic protocols]
第12题:
from a zone to the router itself
from a zone to the same zone
from a zone to a different zone
from one interface to another interface
第13题:
A traffic separation zone is that part of a traffic separation scheme which ______.
A.is located between the scheme and the nearest land
B.separates traffic proceeding in one direction from traffic proceeding in the opposite direction
C.is designated as an anchorage area
D.contains all the traffic moving in the same direction
第14题:
Which type of zone is used by traffic transiting the device?()
第15题:
You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
第16题:
You want to allow your device to establish OSPF adjacencies with a neighboring device connected tointerface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
第17题:
Which two statements are true for a security policy? ()(Choose two.)
第18题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第19题:
You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()
第20题:
DNS traffic is denied.
HTTP traffic is denied.
FTP traffic is permitted.
SMTP traffic is permitted.
第21题:
is located between the scheme and the nearest land
separates traffic proceeding in one direction from traffic proceeding in the opposite direction
is designated as an anchorage area
contains all the traffic moving in the same direction
第22题:
dead band action
neutral zone action
range
on-off action
第23题:
Traffic is permitted from the trust zone to the untrust zone.
Intrazone traffic in the trust zone is permitted.
All traffic through the device is denied.
The policy is matched only when no other matching policies are found.