Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

题目

Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()

  • A、Pass
  • B、Flow
  • C、Allow
  • D、Inspect
参考答案和解析
正确答案:A,D
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

A.Port security needs to be globally enabled.

B.Port security needs to be enabled on the interface.

C.Port security needs to be configured to shut down the interface in the event of a violation.

D.Port security needs to be configured to allow only one learned MAC address.

E.Port security interface counters need to be cleared before using the show command.

F.The port security configuration needs to be saved to NVRAM before it can become active.


参考答案:B, D

第2题:

Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()

  • A、A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.
  • B、An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.
  • C、Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.
  • D、Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.
  • E、The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.
  • F、The SDM provides a basic, intermediate, and advanced firewall wizard.

正确答案:A,B,E

第3题:

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

A. [edit security idp]

B. [edit security zones security-zone trust interfaces ge-0/0/0.0]

C. [edit security zones security-zone trust]

D. [edit security screen]


参考答案:B, C

第4题:

What is the main reason for using the "ip ips deny-action ips-interface" IOS command?()

  • A、 To selectively apply drop actions to specific interfaces
  • B、 To enable IOS to droptraffic for signatures configured with the Drop action
  • C、 To support load-balancing configurations in which traffic can arrive via multipleinterfaces 
  • D、 This is nota valid IOS command

正确答案:C

第5题:

Which two statements are true about voice VLANs?()

  • A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch ports
  • B、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phones
  • C、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phone
  • D、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration command
  • E、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the port
  • F、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

正确答案:C,D

第6题:

Whichtwoactionscanbeconfiguredtoallowtraffictotraverseaninterfacewhenzone-basedsecurityisbeingemployed?()

A.Pass

B.Flow

C.Allow

D.Inspect


参考答案:A, D

第7题:

Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()

  • A、It is applied only on the input interface of a router.
  • B、It is applied only on the output interface of a router.
  • C、It can be configured either on the input or output interface of a router.
  • D、It cannot be configured on a router interface.
  • E、It is configured under any routing protocol process.

正确答案:A

第8题:

Which two statements about static NAT translations are true?()

A. They are always present in the NAT table.

B. They allow connection to be initiated from the outside.

C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.

D. They require no inside or outside interface markings because addresses are statically defined.


参考答案:A, B

第9题:

Which two options can be used as traffic descriptors when classifying and marking traffic? ()

  • A、incoming interface
  • B、Layer 2 differentiated services code point (DSCP)
  • C、Layer 3 IP precedence
  • D、outgoing interface

正确答案:A,C

第10题:

Which three practices are important to the implementation of a DiffServ QoS architecture?()

  • A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.
  • B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.
  • C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.
  • D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.
  • E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.
  • F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.

正确答案:C,D,F

更多相关问题