niusouti.com
更多“Under which Junos hierarchy level are security policies conf”相关问题
  • 第1题:

    Under which Junos hierarchy level are security policies configured?()

    A. [edit security]

    B. [edit protocols]

    C. [edit firewall]

    D. [edit policy-options]


    参考答案:A

  • 第2题:

    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

    A. Session-Export policies on the Junos Pulse Secure Access Service

    B. Session-Export policies on the Junos Pulse Access Control Service

    C. Session-Import policies on the Junos Pulse Secure Access Service

    D. Session-Import policies on the Junos Pulse Access Control Service

    E. Resource access policies on the Junos Pulse Access Control Service


    参考答案:A, D, E

  • 第3题:

    According to JUNOS software route selection algorithm, which IS-IS route type is most preferred?()

    • A、Level 1 internal routes
    • B、Level 1 external routes
    • C、Level 2 internal routes
    • D、Level 2 external routes

    正确答案:A

  • 第4题:

    Which security or functional zone name has special significance to the Junos OS?()

    • A、self
    • B、trust
    • C、untrust
    • D、junos-global

    正确答案:D

  • 第5题:

    You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()

    • A、[edit security policies from-zone HR to-zone HR]
    • B、[edit security zones functional-zone management protocols]
    • C、[edit security zones protocol-zone HR host-inbound-traffic]
    • D、[edit security zones security-zone HR host-inbound-traffic protocols]

    正确答案:D

  • 第6题:

    Under which configuration hierarchy is an access profile configured for firewall user authentication?()

    • A、[edit access]
    • B、[edit security access]
    • C、[edit firewall access]
    • D、[edit firewall-authentication]

    正确答案:A

  • 第7题:

    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

    • A、[edit security idp]
    • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
    • C、[edit security zones security-zone trust]
    • D、[edit security screen]

    正确答案:B,C

  • 第8题:

    单选题
    Which option provides a hierarchy of data security across lines of business?()
    A

    Alerts

    B

    Multi-Org

    C

    Flexfields

    D

    Shared entities

    E

    Business Intelligence


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Under which Junos hierarchy level are security policies configured?()
    A

    [edit security]

    B

    [edit protocols]

    C

    [edit firewall]

    D

    [edit policy-options]


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()
    A

    The Junos OS drops any flow that does not match the source address or destination address.

    B

    All traffic is dropped.

    C

    All existing sessions continue.

    D

    The Junos OS does a policy re-evaluation.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
    A

    [edit security policies from-zone HR to-zone HR]

    B

    [edit security zones functional-zone management protocols]

    C

    [edit security zones protocol-zone HR host-inbound-traffic]

    D

    [edit security zones security-zone HR host-inbound-traffic protocols]


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Under which configuration hierarchy is an access profile configured for firewall user authentication?()
    A

    [edit access]

    B

    [edit security access]

    C

    [edit firewall access]

    D

    [edit firewall-authentication]


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which security or functional zone name has special significance to the Junos OS?()

    A. self

    B. trust

    C. untrust

    D. junos-global


    参考答案:D

  • 第14题:

    Which of the following are examples of physical security measures?()

    A. Policies and procedures

    B. Encryption

    C. Locked doors

    D. Security personnel

    E. Backup tapes


    参考答案:C, D

  • 第15题:

    After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()

    • A、The Junos OS drops any flow that does not match the source address or destination address.
    • B、All traffic is dropped.
    • C、All existing sessions continue.
    • D、The Junos OS does a policy re-evaluation.

    正确答案:D

  • 第16题:

    Which option provides a hierarchy of data security across lines of business?()

    • A、Alerts
    • B、Multi-Org
    • C、Flexfields
    • D、Shared entities
    • E、Business Intelligence

    正确答案:B

  • 第17题:

    Which of the following are examples of physical security measures?()

    • A、Policies and procedures
    • B、Encryption
    • C、Locked doors
    • D、Security personnel
    • E、Backup tapes

    正确答案:C,D

  • 第18题:

    In which hierarchy are routing policies defined?()

    • A、[edit policy-options]
    • B、[edit routing-options]
    • C、[edit forwarding-options]
    • D、[edit protocols]

    正确答案:A

  • 第19题:

    Under which Junos hierarchy level are security policies configured?()

    • A、[edit security]
    • B、[edit protocols]
    • C、[edit firewall]
    • D、[edit policy-options]

    正确答案:A

  • 第20题:

    单选题
    () means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.
    A

    Security level 1

    B

    Security level 2

    C

    Security level 3

    D

    Medium safe level


    正确答案: C
    解析: 暂无解析

  • 第21题:

    多选题
    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
    A

    Session-Export policies on the Junos Pulse Secure Access Service

    B

    Session-Export policies on the Junos Pulse Access Control Service

    C

    Session-Import policies on the Junos Pulse Secure Access Service

    D

    Session-Import policies on the Junos Pulse Access Control Service

    E

    Resource access policies on the Junos Pulse Access Control Service


    正确答案: B,A
    解析: 暂无解析

  • 第22题:

    多选题
    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
    A

    [edit security idp]

    B

    [edit security zones security-zone trust interfaces ge-0/0/0.0]

    C

    [edit security zones security-zone trust]

    D

    [edit security screen]


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?()
    A

    Individual clients are configured under client groups in the configuration hierarchy.

    B

    Client groups are configured under individual clients in the configuration hierarchy.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第24题:

    单选题
    Rate your level of proficiency with configuring, managing, and troubleshooting security on Windows XP Professional, including Encrypting File System (EFS), local security policies and configurations, local user and group accounts, and Internet Explorer Security settings.()
    A

    Very High

    B

    High

    C

    Moderate

    D

    Low

    E

    Very Low


    正确答案: A
    解析: 暂无解析