from a zone to the router itself
from a zone to the same zone
from a zone to a different zone
from one interface to another interface
第1题:
A. from a zone to the router itself
B. from a zone to the same zone
C. from a zone to a different zone
D. from one interface to another interface
第2题:
You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
第3题:
You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
第4题:
Which two statements are true for a security policy? ()(Choose two.)
第5题:
Users can define policy to control traffic flow between which two components?()
第6题:
Users can define policy to control traffic flow between which two components? ()(Choose two.)
第7题:
Regarding zone types, which statement is true?()
第8题:
It controls inter-zone traffic.
It controls intra-zone traffic.
It is named with a system-defined name.
It controls traffic destined to the device's ingress interface.
第9题:
Pass
Flow
Allow
Inspect
第10题:
[edit security idp]
[edit security zones security-zone trust interfaces ge-0/0/0.0]
[edit security zones security-zone trust]
[edit security screen]
第11题:
Define a default policy for the zone.
Assign logical interfaces to the zone.
Assign physical interfaces to the zone.
Define the zone as a security or functional zone
第12题:
from a zone to the router itself
from a zone to the same zone
from a zone to a different zone
from one interface to another interface
第13题:
Which statement best describes Cisco IOS Zone-Based Policy Firewall?()
第14题:
Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()
第15题:
Which two steps are performed when configuring a zone?()
第16题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
第17题:
Which statement describes a security zone?()
第18题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第19题:
DNS traffic is denied.
HTTP traffic is denied.
FTP traffic is permitted.
SMTP traffic is permitted.
第20题:
A security zone can contain one or more interfaces.
A security zone can contain interfaces in multiple routing instances.
A security zone must contain two or more interfaces.
A security zone must contain bridge groups.
第21题:
A router interface can belong to multiple zones.
Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.
The pass action works in only one direction
A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.
第22题:
from a zone to the device itself
from a zone to the same zone
from a zone to a different zone
from one interface to another interface
第23题:
Traffic is permitted from the trust zone to the untrust zone.
Intrazone traffic in the trust zone is permitted.
All traffic through the device is denied.
The policy is matched only when no other matching policies are found.
第24题:
DNS traffic is denied.
HTTP traffic is denied.
FTP traffic is permitted.
SMTP traffic is permitted.