IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
IDP inspects traffic up to the Application layer.
IDP searches the data stream for specific attack patterns.
IDP inspects traffic up to the Presentation layer.
IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.
第1题:
A. Mark permitted traffic for firewall user authentication.
B. Mark permitted traffic for SCREEN options.
C. Associate permitted traffic with an IPsec tunnel.
D. Associate permitted traffic with a NAT rule.
E. Mark permitted traffic for IDP processing.
第2题:
Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()
第3题:
A. Traffic is permitted from the trust zone to the untrust zone.
B. Intrazone traffic in the trust zone is permitted.
C. All traffic through the device is denied.
D. The policy is matched only when no other matching policies are found.
第4题:
Which three JUNOS software features allow for increased security on your network?()
第5题:
Which two functions of JUNOS Software are handled by the data plane?()
第6题:
Which two statements are true regarding trace options on Junos devices?()
第7题:
Which three statements are true regarding IDP?()
第8题:
A. [edit security idp]
B. [edit security zones security-zone trust interfaces ge-0/0/0.0]
C. [edit security zones security-zone trust]
D. [edit security screen]
第9题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
第10题:
Which three advanced permit actions within security policies are valid?() (Choose three.)