Under which Junos hierarchy level are security policies conf

题目
单选题
Under which Junos hierarchy level are security policies configured?()
A

[edit security]

B

[edit protocols]

C

[edit firewall]

D

[edit policy-options]

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

_______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.

A.Security level 1

B.Security level 2

C.Security level 3

D.Security level 4


正确答案:B

第2题:

Under which Junos hierarchy level are security policies configured?()

A. [edit security]

B. [edit protocols]

C. [edit firewall]

D. [edit policy-options]


参考答案:A

第3题:

Employee unions would most likely satisfy which level in Maslow's hierarchy of needs?

A Belonging

B Self-actualization

C Esteem

D Safety

E Empowerment


正确答案:A

第4题:

According to JUNOS software route selection algorithm, which IS-IS route type is most preferred?()

  • A、Level 1 internal routes
  • B、Level 1 external routes
  • C、Level 2 internal routes
  • D、Level 2 external routes

正确答案:A

第5题:

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

A. Session-Export policies on the Junos Pulse Secure Access Service

B. Session-Export policies on the Junos Pulse Access Control Service

C. Session-Import policies on the Junos Pulse Secure Access Service

D. Session-Import policies on the Junos Pulse Access Control Service

E. Resource access policies on the Junos Pulse Access Control Service


参考答案:A, D, E

第6题:

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

A. [edit security idp]

B. [edit security zones security-zone trust interfaces ge-0/0/0.0]

C. [edit security zones security-zone trust]

D. [edit security screen]


参考答案:B, C

第7题:

Which security or functional zone name has special significance to the Junos OS?()

A. self

B. trust

C. untrust

D. junos-global


参考答案:D

第8题:

Which option provides a hierarchy of data security across lines of business?()

A.Alerts

B.Multi-Org

C.Flexfields

D.Shared entities

E.Business Intelligence


参考答案:B

第9题:

Which of the following are examples of physical security measures?()

A. Policies and procedures

B. Encryption

C. Locked doors

D. Security personnel

E. Backup tapes


参考答案:C, D

第10题:

After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()

  • A、The Junos OS drops any flow that does not match the source address or destination address.
  • B、All traffic is dropped.
  • C、All existing sessions continue.
  • D、The Junos OS does a policy re-evaluation.

正确答案:D

更多相关问题