多选题Which two steps are performed when configuring a zone?()ADefine a default policy for the zone.BAssign logical interfaces to the zone.CAssign physical interfaces to the zone.DDefine the zone as a security or functional zone

题目
多选题
Which two steps are performed when configuring a zone?()
A

Define a default policy for the zone.

B

Assign logical interfaces to the zone.

C

Assign physical interfaces to the zone.

D

Define the zone as a security or functional zone

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

A. [edit security idp]

B. [edit security zones security-zone trust interfaces ge-0/0/0.0]

C. [edit security zones security-zone trust]

D. [edit security screen]


参考答案:B, C

第2题:

Which statement best describes Cisco IOS Zone-Based Policy Firewall?()

  • A、A router interface can belong to multiple zones.
  • B、Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.
  • C、The pass action works in only one direction
  • D、A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.

正确答案:C

第3题:

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

A. Traffic is permitted from the trust zone to the untrust zone.

B. Intrazone traffic in the trust zone is permitted.

C. All traffic through the device is denied.

D. The policy is matched only when no other matching policies are found.


参考答案:C, D

第4题:

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

  • A、[edit security idp]
  • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
  • C、[edit security zones security-zone trust]
  • D、[edit security screen]

正确答案:B,C

第5题:

Which two steps are performed when configuring a zone?()

  • A、Define a default policy for the zone.
  • B、Assign logical interfaces to the zone.
  • C、Assign physical interfaces to the zone.
  • D、Define the zone as a security or functional zone

正确答案:B,D

第6题:

Click the Exhibit button.Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2.Which is a potential cause for this problem?()

A. The untrust zone does not have a management policy configured.

B. The trust zone does not have ping enabled as host-inbound-traffic service.

C. The security policy from the trust zone to the untrust zone does not permit ping.

D. No security policy exists for the ICMP reply packet from the untrust zone to the trust zone.


参考答案:C

第7题:

Which type of zone is used by traffic transiting the device?()

  • A、transit zone
  • B、default zone
  • C、security zone
  • D、functional zone

正确答案:C

第8题:

You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()

A. set security zones management interfaces ge-0/0/0.0

B. set zones functional-zone management interfaces ge-0/0/0.0

C. set security zones functional-zone management interfaces ge-0/0/0.0

D. set security zones functional-zone out-of-band interfaces ge-0/0/0.0


参考答案:C

第9题:

Which two statements are true for a security policy? ()(Choose two.)

  • A、It controls inter-zone traffic.
  • B、It controls intra-zone traffic.
  • C、It is named with a system-defined name.
  • D、It controls traffic destined to the device's ingress interface.

正确答案:A,B

第10题:

Users can define policy to control traffic flow between which two components?()

  • A、from a zone to the device itself
  • B、from a zone to the same zone
  • C、from a zone to a different zone
  • D、from one interface to another interface

正确答案:B,C

更多相关问题