Which two of these are advantages of placing the VPN device parallel to the firewall?()A. high scalabilityB. the design supports a layered security modelC. firewall addressing does not need to changeD. IPsec decrypted traffic is inspected by the firewallE

题目
Which two of these are advantages of placing the VPN device parallel to the firewall?()

A. high scalability

B. the design supports a layered security model

C. firewall addressing does not need to change

D. IPsec decrypted traffic is inspected by the firewall

E. there is a centralized point for logging and content inspection


相似考题
更多“Which two of these are advantages of placing the VPN device parallel to the firewall?() ”相关问题
  • 第1题:

    For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()

    • A、Broadband service
    • B、Headend VPN device
    • C、VPN access device
    • D、Tunnel

    正确答案:B

  • 第2题:

    Which two statements are correct about firewall filters in the Junos OS?()

    • A、Firewall filters are stateless.
    • B、Firewall filters are used to control routing information that is exchanged between devices.
    • C、Firewall filters are used to control traffic passing through the device.
    • D、Firewall filters can only be applied to traffic entering the device.

    正确答案:A,C

  • 第3题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第4题:

    Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()

    • A、 CiscoWorks Security Device Management Center (SD/MC)
    • B、 Security Device Manager (SDM)
    • C、 Adaptive Security Device Manager (ASDM)
    • D、 CiscoWorks VMS/Management Center (VMS/MC)

    正确答案:D

  • 第5题:

    What is the recommended practice when considering VPN termination and firewall placement?()

    • A、 have the firewall and VPN appliance deployed in parallel
    • B、 place the VPN in line with the firewall, with the VPN terminating inside the firewall
    • C、 place the public side of the VPN termination device in the DMZ behind a firewall
    • D、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

    正确答案:C

  • 第6题:

    As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()

    • A、 inline with a firewall
    • B、 in a DMZ outside the firewall
    • C、 parallel with a firewall
    • D、 in a DMZ behind the firewall

    正确答案:D

  • 第7题:

    Which two statements are true regarding firewall user authentication?()

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
    • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

    正确答案:B,C

  • 第8题:

    单选题
    As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
    A

    inline with a firewall

    B

    in a DMZ outside the firewall

    C

    parallel with a firewall

    D

    in a DMZ behind the firewall


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()
    A

     CiscoWorks Security Device Management Center (SD/MC)

    B

     Security Device Manager (SDM)

    C

     Adaptive Security Device Manager (ASDM)

    D

     CiscoWorks VMS/Management Center (VMS/MC)


    正确答案: B
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are correct about firewall filters in the Junos OS?()
    A

    Firewall filters are stateless.

    B

    Firewall filters are used to control routing information that is exchanged between devices.

    C

    Firewall filters are used to control traffic passing through the device.

    D

    Firewall filters can only be applied to traffic entering the device.


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two of these are advantages of placing the VPN device parallel to the firewall?()
    A

    high scalability

    B

    the design supports a layered security model

    C

    firewall addressing does not need to change

    D

    IPsec decrypted traffic is inspected by the firewall

    E

    there is a centralized point for logging and content inspection


    正确答案: E,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
    A

    fewer devices to manage

    B

    moderate-to-high scalability

    C

    stateful inspection of decrypted VPN traffic

    D

    increased bandwidth with additional interfaces

    E

    decreased complexity as traffic is filtered from the firewall


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Which two actions protect a resource file from direct HTTP access within a web application?()

    • A、Placing it in the /secure directory
    • B、Placing it in the /WEB-INF directory
    • C、Placing it in the /META-INF/secure directory
    • D、Creating a  element within the deployment descriptor

    正确答案:B,C

  • 第14题:

    A traditional router is better suited than a firewall device for which function?()

    • A、VPN establishment
    • B、packet-based forwarding
    • C、stateful packet processing
    • D、Network Address Translation

    正确答案:B

  • 第15题:

    Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()

    • A、 onboard VPN accelerator
    • B、 events correlation and proactive response
    • C、 high-performance AIM VPN modules
    • D、 virtual firewall
    • E、 Cisco lOS Firewall and lOS IPS
    • F、 transparent firewall

    正确答案:A,C,E

  • 第16题:

    Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

    • A、fewer devices to manage
    • B、moderate-to-high scalability
    • C、stateful inspection of decrypted VPN traffic
    • D、increased bandwidth with additional interfaces
    • E、decreased complexity as traffic is filtered from the firewall

    正确答案:B,C

  • 第17题:

    Which two of these are advantages of placing the VPN device parallel to the firewall?()

    • A、 high scalability
    • B、 the design supports a layered security model
    • C、 firewall addressing does not need to change
    • D、 IPsec decrypted traffic is inspected by the firewall
    • E、 there is a centralized point for logging and content inspection

    正确答案:A,C

  • 第18题:

    Which data synchronization options between two geographical locations are supported by PowerHA SystemMirror?()

    • A、Parallel and Serial
    • B、Serial and Asynchronous
    • C、Parallel and Synchronous
    • D、Synchronous and Asynchronous

    正确答案:D

  • 第19题:

    You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()

    • A、 Configure VPN1 as a DHCP Relay Agent.
    • B、 Configure VPN1 to assign IP Address by using DHCP server.
    • C、 Configure VPN1 to have a static pool of IP Address from the network address of 131.107.1.0/24.
    • D、 Configure VPN1 to have a static pool of IP Address from the network address of 192.168.1.0/24.
    • E、 Configure the perimeter firewall to allow inbound DHCP traffic to be passed to VPN1.
    • F、 Configure the interval firewall to allow DHCP broadcasts to be forwarded from the external network to the internal network.

    正确答案:A,B

  • 第20题:

    多选题
    Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()
    A

    onboard VPN accelerator

    B

    events correlation and proactive response

    C

    high-performance AIM VPN modules

    D

    virtual firewall

    E

    Cisco lOS Firewall and lOS IPS

    F

    transparent firewall


    正确答案: B,A
    解析: 暂无解析

  • 第21题:

    单选题
    As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
    A

     inline with a firewall

    B

     in a DMZ outside the firewall

    C

     parallel with a firewall

    D

     in a DMZ behind the firewall


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第23题:

    单选题
    What is the recommended practice when considering VPN termination and firewall placement?()
    A

     have the firewall and VPN appliance deployed in parallel

    B

     place the VPN in line with the firewall, with the VPN terminating inside the firewall

    C

     place the public side of the VPN termination device in the DMZ behind a firewall

    D

     place the VPN in line with the firewall, with the VPN terminating outside the firewall


    正确答案: A
    解析: 暂无解析