In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source

题目

In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers; application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the existing FTP and BGP sessions?()

  • A、The existing FTP and BGP sessions will continue.
  • B、The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.
  • C、The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.
  • D、The existing FTP sessions will continue and only the existing BGP sessions will be dropped.
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Click the Exhibit button.A network administrator receives complaints that the application voicecube is timing out after being idle for 30 minutes.Referring to the exhibit, what is a resolution?()

A. [edit] user@host# set applications application voicecube inactivity-timeout never

B. [edit] user@host# set applications application voicecube inactivity-timeout 2

C. [edit] user@host# set applications application voicecube destination-port 5060

D. [edit] user@host# set security policies from-zone trust to-zone trust policy intrazone then timeout never


参考答案:A

第2题:

After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()

A. The Junos OS drops any flow that does not match the source address or destination address.

B. All traffic is dropped.

C. All existing sessions continue.

D. The Junos OS does a policy re-evaluation.


参考答案:D

第3题:

Click the Exhibit button.In the configuration shown in the exhibit, you decided to eliminate the junos-ftp application from the match condition of the policy MyTraffic.What will happen to the existing FTP and BGPsessions?()

A. The existing FTP and BGP sessions will continue.

B. The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.

C. The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.

D. The existing FTP sessions will continue and only the existing BGP sessions will be dropped.


参考答案:B

第4题:

After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()

  • A、The Junos OS drops any flow that does not match the source address or destination address.
  • B、All traffic is dropped.
  • C、All existing sessions continue.
  • D、The Junos OS does a policy re-evaluation.

正确答案:D

第5题:

Which two statements are true regarding routing policy processing?()

A. The Junos OS verifies the match criteria of each policy in order and performs the associated action when a match occurs.

B. Policies are evaluated from right to left as displayed in the Junos OS configuration file.

C. Polices are evaluated based on the order in which they are applied to a routing protocol.

D. Policy processing stops once the last statement in the policy is evaluated.


参考答案:A, C

第6题:

A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone.Which configuration statement would correctly accomplish this task?()

A. from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

B. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

C. from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }

D. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }


参考答案:B

第7题:

Referring to the exhibit, you must move the match term above the reject term. Which command would accomplish this task?()

A. set term match from policy reject

B. up 1 copy policy-statement my-policy term match to term before-reject

C. activate term match to policy

D. insert term match before term reject


参考答案:D

第8题:

Click the Exhibit button.Referring to the exhibit, which statement contains the correct gateway parameters?()

A. [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

B. [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

C. [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

D. [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }


参考答案:B

第9题:

Based on the configuration shown in the exhibit, what will happen to the traffic matching thesecurity policy?() [edit schedulers] user@host# showscheduler now { monday all-day; tuesday exclude; wednesday { start-time 07:00:00 stop-time 18:00:00; } thursday { start-time 07:00:00 stop-time 18:00:00; } } [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }

  • A、The traffic is permitted through the myTunnel IPsec tunnel only on Tuesdays.
  • B、The traffic is permitted through the myTunnel IPsec tunnel daily, with the exception of Mondays.
  • C、The traffic is permitted through the myTunnel IPsec tunnel all day on Mondays and Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.
  • D、The traffic is permitted through the myTunnel IPsec tunnel all day on Mondays and Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am

正确答案:C

第10题:

Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }

  • A、DNS traffic is denied.
  • B、HTTP traffic is denied.
  • C、FTP traffic is permitted.
  • D、SMTP traffic is permitted.

正确答案:A,C

更多相关问题