多选题Which three statements are true regarding IDP?()AIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP inspects traffic up to the Application layer.CIDP searches the data st

题目
多选题
Which three statements are true regarding IDP?()
A

IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

B

IDP inspects traffic up to the Application layer.

C

IDP searches the data stream for specific attack patterns.

D

IDP inspects traffic up to the Presentation layer.

E

IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three advanced permit actions within security policies are valid?() (Choose three.)

A. Mark permitted traffic for firewall user authentication.

B. Mark permitted traffic for SCREEN options.

C. Associate permitted traffic with an IPsec tunnel.

D. Associate permitted traffic with a NAT rule.

E. Mark permitted traffic for IDP processing.


参考答案:A, C, E

第2题:

Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()

  • A、JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.
  • B、JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.
  • C、JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.
  • D、JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

正确答案:B,C

第3题:

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

A. Traffic is permitted from the trust zone to the untrust zone.

B. Intrazone traffic in the trust zone is permitted.

C. All traffic through the device is denied.

D. The policy is matched only when no other matching policies are found.


参考答案:C, D

第4题:

Which three JUNOS software features allow for increased security on your network?()

  • A、firewall filters
  • B、data encryption
  • C、routing protocol authentication
  • D、support for BGP path mtu discovery
  • E、automatic discovery for IPSEC neighbors

正确答案:A,B,C

第5题:

Which two functions of JUNOS Software are handled by the data plane?()

  • A、NAT
  • B、OSPF
  • C、SNMP
  • D、SCREEN options

正确答案:A,D

第6题:

Which two statements are true regarding trace options on Junos devices?()

  • A、You can see the contents of the log file by entering the show log <filename> command
  • B、Trace options will send information to your screen automatically
  • C、Trace options are limited to one protocol at a time
  • D、The file name and set of flags may be specified when enabling trace options

正确答案:A,D

第7题:

Which three statements are true regarding IDP?()

  • A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
  • B、IDP inspects traffic up to the Application layer.
  • C、IDP searches the data stream for specific attack patterns.
  • D、IDP inspects traffic up to the Presentation layer.
  • E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

正确答案:B,C,E

第8题:

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

A. [edit security idp]

B. [edit security zones security-zone trust interfaces ge-0/0/0.0]

C. [edit security zones security-zone trust]

D. [edit security screen]


参考答案:B, C

第9题:

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

  • A、[edit security idp]
  • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
  • C、[edit security zones security-zone trust]
  • D、[edit security screen]

正确答案:B,C

第10题:

Which three advanced permit actions within security policies are valid?() (Choose three.)

  • A、Mark permitted traffic for firewall user authentication.
  • B、Mark permitted traffic for SCREEN options.
  • C、Associate permitted traffic with an IPsec tunnel.
  • D、Associate permitted traffic with a NAT rule.
  • E、Mark permitted traffic for IDP processing.

正确答案:A,C,E

更多相关问题