What is a Host Enforcer policy?()A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C. A policy that is sent to the pro

题目
What is a Host Enforcer policy?()

A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.

B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.

C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.

D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.


相似考题

4.Which statement contains the correct parameters for a route-based IPsec VPN?()A. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }B. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }C. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }D. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

参考答案和解析
参考答案:B
更多“What is a Host Enforcer policy?() ”相关问题
  • 第1题:

    ABGProuterhasthefollowingconfiguration:

    protocols{

    bgp{

    export[policy-1policy-2policy-3];

    }}

    policy-options{

    policy-statementpolicy-2{

    termget-statics{

    fromprotocolstatic;

    thenaccept;

    }

    termreject-all{

    thenreject;

    }

    }

    policy-statementpolicy-1{

    termget-aggregate{

    fromprotocolaggregate;

    thenaccept;

    }

    termreject-all{

    thenreject;

    }

    }

    policy-statementpolicy-3{

    termget-ospf{

    fromprotocolospf;

    thenaccept;

    }

    termreject-all{

    thenreject;

    }

    }

    }

    Whichpolicytermisevaluatedfirstwhenexportingroutes?()


    参考答案:D

  • 第2题:

    A technician is using a packet sniffer to identify a server. The technician observes the followingnetwork traffic:Which of the following is MOST likely to be the server?()

    A.HOST-A

    B.HOST-B

    C.HOST-C

    D.HOST-D


    参考答案:A

  • 第3题:

    ASA/PIXversion7.0introducedModularPolicyFramework(MPF)asanextensiblewaytoclassifytraffic,andthenapplypolicies(oractions)tothattraffic.MPFataminimum requireswhichthreecommands?()

    A.http-map,tcp-map,class-map

    B.class-map,tcp-map,policy-map

    C.class-map,policy-map,service-map

    D.class-map,service-policy,policy-map


    参考答案:D

  • 第4题:

    Which naming convention is used by Juniper Routers when archiving their configurations to a remote server?()

    A.yyyymmdd_HHMMSS_host-name_juniper.conf.gz

    B.host-name_juniper.conf.gz_yyyymmdd_HHMMSS

    C.yyyymmdd_HHMMSS_host-name_juniper.conf

    D.host-name_juniper.conf_yyyymmdd_HHMMSS


    参考答案:B

  • 第5题:

    WhenconfiguringdualVIOserverstoconnecttoSANbaseddiskinfailovermode,whatsettingmustbeapplied?()

    A.algorithm=failover

    B.algorithm=round_robin

    C.reserve_policy=no_reserve

    D.reserve_policy=single_path


    参考答案:C

  • 第6题:

    Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。

    A.Host 1 addresses the frames to the MAC address of router R1

    B.Host 1 looks in its ARP cache for the MAC address of router R1

    C.Host 1 addresses the frames to the MAC address of web server 2

    D.Host 1 sends the packets to router R1 to be forwarded to web server 2

    E.Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2


    参考答案:C, E