If the policies shown below evaluate as described, which action will occur for the listed policy expression?() Policy A=True Policy B=True Policy C=True Policy D=False Policy Expression: !(AB)||CA、The policy evaluates to True (an).B、The policy evaluates t

题目

If the policies shown below evaluate as described, which action will occur for the listed policy expression?() Policy A=True Policy B=True Policy C=True Policy D=False Policy Expression: !(A&&B)||C

  • A、The policy evaluates to True (a&&n).
  • B、The policy evaluates to True because of c.
  • C、The policy evaluates to False because of c.
  • D、The policy evaluates to False because of !(a&&b).
参考答案和解析
正确答案:B
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are true regarding routing policy processing?()

A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.

B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.

C. Polices are evaluated based on the order in which they are applied to a routing protocol.

D. Policy processing stops once the last statement in the policy is evaluated.


参考答案:A, C

第2题:

Which three statements are true about terms in a policy?()

  • A、The order of the terms in a policy is irrelevant
  • B、The action is specified in a then statement
  • C、Ters are optional in a policy
  • D、The match condition can be identified with a from statement
  • E、Every policy must contain at least one term

正确答案:B,D,E

第3题:

Which statement is true about terms in a policy?()

A. A single term can be applied to a protocol or interface, independent of the policy.

B. Once configured, terms within a policy cannot be reordered.

C. The name of a term is limited to five characters.

D. A from statement is optional in a term.


参考答案:D

第4题:

Regarding a route-based versus policy-based IPsec VPN, which statement is true?()

  • A、A route-based VPN generally uses less resources than a policy-based VPN.
  • B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.
  • C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.
  • D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

正确答案:A

第5题:

Which statement regarding the implementation of an IDP policy template is true?()

  • A、IDP policy templates are automatically installed as the active IDP policy.
  • B、IDP policy templates are enabled using a commit script.
  • C、IDP policy templates can be downloaded without an IDP license.
  • D、IDP policy templates are included in the factory-default configuration.

正确答案:B

第6题:

Which statement is true about terms in a policy?()

  • A、A single term can be applied to a protocol or interface, independent of the policy.
  • B、Once configured, terms within a policy cannot be reordered.
  • C、The name of a term is limited to five characters.
  • D、A from statement is optional in a term.

正确答案:D

第7题:

Which statement is true about terms in a policy?()

  • A、A single term can be applied to a protocol or interface, independent of the policy
  • B、Every policy must contain at least one term
  • C、The name of a term is limited to five characters
  • D、Terms are optional

正确答案:B

第8题:

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

A. Traffic is permitted from the trust zone to the untrust zone.

B. Intrazone traffic in the trust zone is permitted.

C. All traffic through the device is denied.

D. The policy is matched only when no other matching policies are found.


参考答案:C, D

第9题:

You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

  • A、Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
  • B、Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
  • C、Configure the Host Checker policy as a role restriction for the Employee role.
  • D、Configure the Host Checker policy as a resource access policy for the Employee role.

正确答案:B,C

第10题:

Which two statements are true about applying Host Checker at the realm level?()

  • A、If Evaluate is checked then the client must pass policy to get the sign-in page.
  • B、If Evaluate is checked then the client can fail policy and still get the sign-in page.
  • C、If Require and Enforce is checked then the client must pass policy to get the sign-in page.
  • D、If Require and Enforce is checked then the client can fail policy and still get the sign-in page.

正确答案:B,C

更多相关问题