The last policy is the default policy, which allows all traffic.
The order of policies is not important.
New policies are placed at the end of the policy list.
The insert command can be used to change the order.
第1题:
A. The BGP import policy accepts all BGP routes.
B. The BGP export policy rejects all active BGP routes.
C. The OSPF import policy accepts all OSPF routes.
D. The OSPF export policy accepts all active OSPF routes.
第2题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第3题:
Which two statements apply to policy scheduling?() (Choose two.)
第4题:
Which two statements are true with regard to policy ordering? ()(Choose two.)
第5题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第6题:
Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()
第7题:
The BGP import policy accepts all BGP routes.
The BGP export policy rejects all active BGP routes.
The OSPF import policy accepts all OSPF routes.
The OSPF export policy accepts all active OSPF routes.
第8题:
An individual policy can have only one scheduler applied.
You must manually configure system-time updates.
Multiple policies can use the same scheduler.
Policies that do not have schedulers are not active.
第9题:
The order of the terms in a policy is irrelevant.
The action is specified in a then statement.
Terms are optional in a policy.
The match condition can be identified with a from statement.
A from statement is mandatory in a term.
第10题:
The policy evaluates to True (a&&n).
The policy evaluates to True because of c.
The policy evaluates to False because of c.
The policy evaluates to False because of !(a&&b).
第11题:
1 is the default precedence.
A lower number is preferred.
A higher number is preferred.
100 is the default precedence.
第12题:
Traffic is permitted from the trust zone to the untrust zone.
Intrazone traffic in the trust zone is permitted.
All traffic through the device is denied.
The policy is matched only when no other matching policies are found.
第13题:
A. All roles are evaluated together.
B. Each role is evaluated separately.
C. Clients must pass all policies to access the role.
D. Clients will pass as long as one policy is accepted.
第14题:
Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?()
第15题:
If the policies shown below evaluate as described, which action will occur for the listed policy expression?() Policy A=True Policy B=True Policy C=True Policy D=False Policy Expression: !(A&&B)||C
第16题:
Which two statements are true about precedence values in policy?() (Choose two.)
第17题:
Which two statements are true regarding routing policy processing?()
第18题:
End system
Protocol
Application
Throughput
第19题:
The order of the terms in a policy is irrelevant
The action is specified in a then statement
Ters are optional in a policy
The match condition can be identified with a from statement
Every policy must contain at least one term
第20题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第21题:
mode
IKE gateway
security proposal
Perfect Forward Secrecy
第22题:
All roles are evaluated together.
Each role is evaluated separately.
Clients must pass all policies to access the role.
Clients will pass as long as one policy is accepted.
第23题:
The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.
Policies are evaluated from right to left as displayed in the Junos OS configuration file.
Polices are evaluated based on the order in which they are applied to a routing protocol.
Policy processing stops once the last statement in the policy is evaluated.