Which three advanced permit actions within security policies are valid?() (Choose three.)A. Mark permitted traffic for firewall user authentication.B. Mark permitted traffic for SCREEN options.C. Associate permitted traffic with an IPsec tunnel.D. Associa

题目
Which three advanced permit actions within security policies are valid?() (Choose three.)

A. Mark permitted traffic for firewall user authentication.

B. Mark permitted traffic for SCREEN options.

C. Associate permitted traffic with an IPsec tunnel.

D. Associate permitted traffic with a NAT rule.

E. Mark permitted traffic for IDP processing.


相似考题
更多“Which three advanced permit actions within security policies are valid?() (Choose three.) ”相关问题
  • 第1题:

    ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis()

    A./etc/security/limits

    B./etc/security/mkuser.sys

    C./etc/security/priv

    D./etc/security/user


    参考答案:D

  • 第2题:

    An access list was written with the four statements shown in the graphic.Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect?()

    A.access-list10 permit 172.29.16.00.0.0.255

    B.access-list10 permit 172.29.16.00.0.1.255

    C.access-list10 permit 172.29.16.00.0.3.255

    D.access-list10 permit 172.29.16.00.0.15.255

    E.access-list10 permit 172.29.0.00.0.255.255


    参考答案:C

  • 第3题:

    下列选项中哪一条可以准确的匹配并代替以下四条访问控制列表()(1):access-list 10 permit172.29.16.00.0.0.255(2):access-list 10 permit172.29.17.00.0.0.255(3):access-lis t10 permit172.29.18.00.0.0.255(4):access-list 10 permit172.29.19.00.0.0.255

    A.access-list 10 permit 172.29.16.00.0.0.255

    B.access-list 10 permit 172.29.16.00.0.1.255

    C.access-list 10 permit 172.29.16.00.0.3.255

    D.access-list 10 permit 172.29.16.00.0.15.255

    E.access-list 10 permit 172.29.16.0255.255.252.0


    参考答案:C

  • 第4题:

    以下程序段的输出结果为( )。 int j=2 switch (j){ Case 2: system.out.print("two."): Case 2+1: System.out.println("three."); break: default: System.out.println (“value is”+j): Break }A.B.two

    A.two.three.

    B.two

    C.three

    D.value is 2


    正确答案:A

  • 第5题:

    Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect()。

    A.access-list 10 permit 172.29.16.0 0.0.0.255

    B.access-list 10 permit 172.29.16.0 0.0.1.255

    C.access-list 10 permit 172.29.16.0 0.0.3.255

    D.access-list 10 permit 172.29.16.0 0.0.15.255

    E.access-list 10 permit 172.29.0.0 0.0.255.255


    参考答案:C

  • 第6题:


    According to Para.7,which of the following is not the way that passage suggests to improve cyber-security?( )

    A.Be quick to predict and respond when there is insecurity.
    B.Make sure everyone is equipped with fundamental knowledge of cyber-security.
    C.Be cooperative with counterparts on cyber-security.
    D.Be cautious using Internet.

    答案:D
    解析: