单选题What is the purpose of a zone in JUNOS Software?()A A zone defines a group of security devices with a common management.B A zone defines the geographic region in which the security device is deployed.C A zone defines a group of network segments with si

题目
单选题
What is the purpose of a zone in JUNOS Software?()
A

A zone defines a group of security devices with a common management.

B

A zone defines the geographic region in which the security device is deployed.

C

A zone defines a group of network segments with similar security requirements.

D

A zone defines a group of network segments with similar class-of-service requirements.


相似考题
更多“单选题What is the purpose of a zone in JUNOS Software?()A A zone defines a group of security devices with a common management.B A zone defines the geographic region in which the security device is deployed.C A zone defines a group of network segments with si”相关问题
  • 第1题:

    Which type of zone is used by traffic transiting the device?()

    • A、transit zone
    • B、default zone
    • C、security zone
    • D、functional zone

    正确答案:C

  • 第2题:

    What is the purpose of an address book?()

    • A、It holds security policies for particular hosts.
    • B、It holds statistics about traffic to and from particular hosts.
    • C、It defines hosts in a zone so they can be referenced by policies.
    • D、It maps hostnames to IP addresses to serve as a backup to DNS resolution.

    正确答案:C

  • 第3题:

    Which two steps are performed when configuring a zone?()

    • A、Define a default policy for the zone.
    • B、Assign logical interfaces to the zone.
    • C、Assign physical interfaces to the zone.
    • D、Define the zone as a security or functional zone

    正确答案:B,D

  • 第4题:

    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

    • A、[edit security idp]
    • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
    • C、[edit security zones security-zone trust]
    • D、[edit security screen]

    正确答案:B,C

  • 第5题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    • A、Traffic is permitted from the trust zone to the untrust zone.
    • B、Intrazone traffic in the trust zone is permitted.
    • C、All traffic through the device is denied.
    • D、The policy is matched only when no other matching policies are found.

    正确答案:C,D

  • 第6题:

    You manage a domain controller that runs Windows Server 2008 R2 and the DNS Server server role. The DNS server hosts an Active Directory-integrated zone for your domain.You need to provide a user with the ability to manage records in the zone. The user must not be able to modify the DNS server settings. What should you do?()

    • A、Add the user to the DNSUpdateProxy Global security group.
    • B、Add the user to the DNSAdmins Domain Local security group.
    • C、Grant the user permissions on the zone.
    • D、Grant the user permissions on the DNS server.

    正确答案:C

  • 第7题:

    单选题
    You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()
    A

    set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-Spam

    B

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-Spam

    C

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policy

    D

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    You manage a domain controller that runs Windows Server 2008 R2 and the DNS Server server role. The DNS server hosts an Active Directory-integrated zone for your domain.You need to provide a user with the ability to manage records in the zone. The user must not be able to modify the DNS server settings. What should you do?()
    A

    Add the user to the DNSUpdateProxy Global security group.

    B

    Add the user to the DNSAdmins Domain Local security group.

    C

    Grant the user permissions on the zone.

    D

    Grant the user permissions on the DNS server.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which security or functional zone name has special significance to the Junos OS?()
    A

    self

    B

    trust

    C

    untrust

    D

    junos-global


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
    A

    [edit security idp]

    B

    [edit security zones security-zone trust interfaces ge-0/0/0.0]

    C

    [edit security zones security-zone trust]

    D

    [edit security screen]


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    单选题
    Referring to the exhibit, what is the purpose of the targets section of the configuration?()
    A

    It defines which devices will be sending traps.

    B

    It specifies where to send traps.

    C

    It defines the IP addresses of management systems that can access the device.

    D

    It specifies which devices can be polled for SNMP data.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    What is the purpose of an address book?()
    A

    It holds security policies for particular hosts.

    B

    It holds statistics about traffic to and from particular hosts.

    C

    It defines hosts in a zone so they can be referenced by policies.

    D

    It maps hostnames to IP addresses to serve as a backup to DNS resolution.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which security or functional zone name has special significance to the Junos OS?()

    • A、self
    • B、trust
    • C、untrust
    • D、junos-global

    正确答案:D

  • 第14题:

    You want to allow your device to establish OSPF adjacencies with a neighboring device connected tointerface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()

    • A、[edit security policies from-zone HR to-zone HR]
    • B、[edit security zones functional-zone management protocols]
    • C、[edit security zones protocol-zone HR host-inbound-traffic]
    • D、[edit security zones security-zone HR host-inbound-traffic protocols]

    正确答案:D

  • 第15题:

    What is the purpose of a zone in JUNOS Software?()

    • A、A zone defines a group of security devices with a common management.
    • B、A zone defines the geographic region in which the security device is deployed.
    • C、A zone defines a group of network segments with similar security requirements.
    • D、A zone defines a group of network segments with similar class-of-service requirements.

    正确答案:C

  • 第16题:

    Which statement describes a security zone?()

    • A、A security zone can contain one or more interfaces.
    • B、A security zone can contain interfaces in multiple routing instances.
    • C、A security zone must contain two or more interfaces.
    • D、A security zone must contain bridge groups.

    正确答案:A

  • 第17题:

    Regarding zone types, which statement is true?()

    • A、You cannot assign an interface to a functional zone.
    • B、You can specifiy a functional zone in a security policy.
    • C、Security zones must have a scheduler applied.
    • D、You can use a security zone for traffic destined for the device itself.

    正确答案:D

  • 第18题:

    You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()

    • A、The user permissions on the zone should be granted.
    • B、The user permissions on the DNS zone should be granted.
    • C、The user should be added to the DNSUpdateProxy Global security group.
    • D、The user should be added to the DNSAdmins domain local security group.

    正确答案:A

  • 第19题:

    单选题
    You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services, configuring name resolution and network access and so on. You are in charge of a domain controller that runs windows server 2008 and the DNS server role. The dns server hosts an active directory-integrated zone for your domain. You need to provide a user with the ability to manage records in the zone. But the user must not so what action should you perform?()
    A

    The user permissions on the zone should be granted.

    B

    The user permissions on the DNS zone should be granted.

    C

    The user should be added to the DNSUpdateProxy Global security group.

    D

    The user should be added to the DNSAdmins domain local security group.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Which statement describes a security zone?()
    A

    A security zone can contain one or more interfaces.

    B

    A security zone can contain interfaces in multiple routing instances.

    C

    A security zone must contain two or more interfaces.

    D

    A security zone must contain bridge groups.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Your task is to provision the JUNOS security platform to permit transit packets from the Private zone to theExternal zone by using an IPsec VPN and log information at the time of session close. Which configurationmeets this requirement?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
    A

    [edit security policies from-zone HR to-zone HR]

    B

    [edit security zones functional-zone management protocols]

    C

    [edit security zones protocol-zone HR host-inbound-traffic]

    D

    [edit security zones security-zone HR host-inbound-traffic protocols]


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Regarding zone types, which statement is true?()
    A

    You cannot assign an interface to a functional zone.

    B

    You can specifiy a functional zone in a security policy.

    C

    Security zones must have a scheduler applied.

    D

    You can use a security zone for traffic destined for the device itself.


    正确答案: D
    解析: 暂无解析