多选题Which two statements are true for a security policy? ()(Choose two.)AIt controls inter-zone traffic.BIt controls intra-zone traffic.CIt is named with a system-defined name.DIt controls traffic destined to the device's ingress interface.

题目
多选题
Which two statements are true for a security policy? ()(Choose two.)
A

It controls inter-zone traffic.

B

It controls intra-zone traffic.

C

It is named with a system-defined name.

D

It controls traffic destined to the device's ingress interface.


相似考题
更多“多选题Which two statements are true for a security policy? ()(Choose two.)AIt controls inter-zone traffic.BIt controls intra-zone traffic.CIt is named with a system-defined name.DIt controls traffic destined to the device's ingress interface.”相关问题
  • 第1题:

    Which two statements are true about precedence values in policy?() (Choose two.)

    A. 1 is the default precedence.

    B. A lower number is preferred.

    C. A higher number is preferred.

    D. 100 is the default precedence.


    参考答案:B, D

  • 第2题:

    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

    • A、A client group is a list of clients associated with a group.
    • B、A client group is a list of groups associated with a client.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第3题:

    Which statement describes the behavior of a security policy?()

    • A、The implicit default security policy permits all traffic.
    • B、Traffic destined to the device itself always requires a security policy.
    • C、Traffic destined to the device’s incoming interface does not require a security policy.
    • D、The factory-default configuration permits all traffic from all interfaces.

    正确答案:C

  • 第4题:

    Which two statements describe the purpose of a security policy?()

    • A、It enables traffic counting and logging.
    • B、It enforces a set of rules for transit traffic.
    • C、It controls host inbound services on a zone.
    • D、It controls administrator rights to access the device.

    正确答案:A,B

  • 第5题:

    Which two parameters are configured in IPsec policy? ()(Choose two.)

    • A、mode
    • B、IKE gateway
    • C、security proposal
    • D、Perfect Forward Secrecy

    正确答案:C,D

  • 第6题:

    Which two statements are true about precedence values in policy?() (Choose two.)

    • A、1 is the default precedence.
    • B、A lower number is preferred.
    • C、A higher number is preferred.
    • D、100 is the default precedence.

    正确答案:B,D

  • 第7题:

    Regarding zone types, which statement is true?()

    • A、You cannot assign an interface to a functional zone.
    • B、You can specifiy a functional zone in a security policy.
    • C、Security zones must have a scheduler applied.
    • D、You can use a security zone for traffic destined for the device itself.

    正确答案:D

  • 第8题:

    多选题
    You create a Web Form. You need to add controls that use adaptive rendering to display content. The type of content rendered must depend on the device that is requesting the page. What are two possible ways to achieve this goal? ()
    A

    Add custom controls that emit XHTML to the Web Form.

    B

    Add custom controls that emit WML to the Web Form.

    C

    Add mobile controls to the Web Form.

    D

    Add Web server controls to the Web Form.


    正确答案: C,B
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements describe the purpose of a security policy?()
    A

    It enables traffic counting and logging.

    B

    It enforces a set of rules for transit traffic.

    C

    It controls host inbound services on a zone.

    D

    It controls administrator rights to access the device.


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about precedence values in policy?() (Choose two.)
    A

    1 is the default precedence.

    B

    A lower number is preferred.

    C

    A higher number is preferred.

    D

    100 is the default precedence.


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
    A

    Traffic is permitted from the trust zone to the untrust zone.

    B

    Intrazone traffic in the trust zone is permitted.

    C

    All traffic through the device is denied.

    D

    The policy is matched only when no other matching policies are found.


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Which two statements regarding JUNOS architecture are correct?()

    A.The Routing Engine handles all exception traffic.

    B.The Routing Engine synchronizes the route table with the PFE

    C.The Routing Engine is hot-pluggable.

    D.The Routing Engine controls the PFE


    参考答案:C, D

  • 第14题:

    Which two statements are true about L2TP tunnels?() (Choose two.)

    • A、Traffic is clear text
    • B、Traffic is encrypted 
    • C、They are initiated by the LNS
    • D、They are initiated by the LAC

    正确答案:A,D

  • 第15题:

    Which two statements regarding JUNOS architecture are correct?()

    • A、The Routing Engine handles all exception traffic.
    • B、The Routing Engine synchronizes the route table with the PFE
    • C、The Routing Engine is hot-pluggable.
    • D、The Routing Engine controls the PFE

    正确答案:C,D

  • 第16题:

    Which two statements are true for a security policy? ()(Choose two.)

    • A、It controls inter-zone traffic.
    • B、It controls intra-zone traffic.
    • C、It is named with a system-defined name.
    • D、It controls traffic destined to the device's ingress interface.

    正确答案:A,B

  • 第17题:

    Which two statements are true with regard to policy ordering? ()(Choose two.)

    • A、The last policy is the default policy, which allows all traffic.
    • B、The order of policies is not important.
    • C、New policies are placed at the end of the policy list.
    • D、The insert command can be used to change the order.

    正确答案:C,D

  • 第18题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    • A、Traffic is permitted from the trust zone to the untrust zone.
    • B、Intrazone traffic in the trust zone is permitted.
    • C、All traffic through the device is denied.
    • D、The policy is matched only when no other matching policies are found.

    正确答案:C,D

  • 第19题:

    多选题
    Which two statements are true with regard to policy ordering? ()(Choose two.)
    A

    The last policy is the default policy, which allows all traffic.

    B

    The order of policies is not important.

    C

    New policies are placed at the end of the policy list.

    D

    The insert command can be used to change the order.


    正确答案: C,D
    解析: 暂无解析

  • 第20题:

    单选题
    Which statement describes the behavior of a security policy?()
    A

    The implicit default security policy permits all traffic.

    B

    Traffic destined to the device itself always requires a security policy.

    C

    Traffic destined to the device’s incoming interface does not require a security policy.

    D

    The factory-default configuration permits all traffic from all interfaces.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)
    A

    It is necessary to forward ARP requests to remote hosts.

    B

    It is necessary when translated traffic belongs to the same subnet as the ingress interface.

    C

    It is not automatic and you must configure it.

    D

    It is enabled by default and you do not need to configure it.


    正确答案: D,B
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements regarding JUNOS architecture are correct?()
    A

    The Routing Engine handles all exception traffic.

    B

    The Routing Engine synchronizes the route table with the PFE

    C

    The Routing Engine is hot-pluggable.

    D

    The Routing Engine controls the PFE


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements are true about the duplexing of the backups taken by RMAN? ()(Choose two.)
    A

    It's only supported for the backups performed on the tape

    B

    It is not supported for backup operations that produce image copies

    C

    Duplex backups need a parallelism for the device to be equal to number of copies

    D

    Duplex backups can be performed to either disk or tape, but cannot be performed on tape and disk simultaneously


    正确答案: B,D
    解析: 暂无解析