题目内容 (请给出正确答案)
[单选题]

Whichthreeadvancedpermitactionswithinsecuritypoliciesarevalid?()

A.Markpermittedtrafficforfirewalluserauthentication.

B.MarkpermittedtrafficforSCREENoptions.

C.AssociatepermittedtrafficwithanIPsectunnel.

D.AssociatepermittedtrafficwithaNATrule.

E.MarkpermittedtrafficforIDPprocessing.

提问人:网友kfasd12 发布时间:2022-01-07
参考答案
查看官方参考答案
如搜索结果不匹配,请 联系老师 获取答案
网友答案
查看全部
  • · 有4位网友选择 A,占比40%
  • · 有3位网友选择 B,占比30%
  • · 有2位网友选择 D,占比20%
  • · 有1位网友选择 C,占比10%
匿名网友 选择了B
[73.***.***.247] 1天前
匿名网友 选择了B
[9.***.***.193] 1天前
匿名网友 选择了A
[123.***.***.38] 1天前
匿名网友 选择了D
[86.***.***.38] 1天前
匿名网友 选择了C
[11.***.***.7] 1天前
匿名网友 选择了B
[32.***.***.246] 1天前
匿名网友 选择了A
[178.***.***.51] 1天前
匿名网友 选择了A
[158.***.***.0] 1天前
匿名网友 选择了A
[208.***.***.119] 1天前
匿名网友 选择了D
[159.***.***.135] 1天前
加载更多
提交我的答案
登录提交答案,可赢取奖励机会。
更多“Whichthreeadvancedpermitaction…”相关的问题
第1题
Which description about “Mortgage Backed Security” is incorrect?

A、MBS is a type of asset-backed security that is secured by a mortgage or collection of mortgages.

B、It usually pays periodic payments that are similar to coupon payments.

C、It’s the core holding of almost all U.S. institutional fixed-income investors.

D、The mortgage does not need to have originated from a regulated and authorized financial institution.

点击查看答案
第2题
YouwanttocreateasecuritypolicyallowingtrafficfromanyhostintheTrustzonetohostb.example.com(172.19.1.1)intheUntrustzone.Howdoyoucreatethispolicy?()

A.SpecifytheIPaddress(172.19.1.1/32)asthedestinationaddressinthepolicy.

B.SpecifytheDNSentry(hostb.example.com.)asthedestinationaddressinthepolicy.

C.CreateanaddressbookentryintheTrustzoneforthe172.19.1.1/32prefixandreferencethisentryin thepolicy.

D.CreateanaddressbookentryintheUntrustzoneforthe172.19.1.1/32prefixandreferencethisentryin thepolicy

点击查看答案
第3题
YourtaskistoprovisiontheJUNOSsecurityplatformtopermittransitpacketsfromthePrivatezonetotheExternalzonebyusinganIPsecVPNandloginformationatthetimeofsessionclose.Whichconfigurationmeetsthisrequirement?()

A.A

B.B

C.C

D.D

点击查看答案
第4题
A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that sourceNAT translation is using a different source address after a random number of flows.Which two actions can the administrator take to force the server to use one address?() (Choose two.)

A. Use the custom application feature.

B. Configure static NAT for the host.

C. Use port address translation (PAT).

D. Use the address-persistent option.

点击查看答案
第5题
You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()

A. EAP-MD5 is not supported by the Junos Pulse Access Control Service

B. EAP-MD5 requires passwords to be stored in an encrypted format.

C. EAP-MD5 requires passwords to be stored in a clear text format.

D. EAP-MD5 performs a real time hash of the handset‘s MAC address.

点击查看答案
第6题
Interfacege-0/0/2.0ofyourdeviceisattachedtotheInternetandisconfiguredwithanIPaddressandnetworkmaskof71.33.252.17/24.AwebserverwithIPaddress10.20.20.1isrunninganHTTPserviceonTCPport8080.Thewebserverisattachedtothege-0/0/0.0interfaceofyourdevice.YoumustuseNATtomakethewebserverreachablefromtheInternetusingporttranslation.WhichtypeofNATmustyouconfigure?()

A.sourceNATwithaddressshifting

B.pool-basedsourceNAT

C.staticdestinationNAT

D.pool-baseddestinationNAT

点击查看答案
第7题
You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network.Which agent should you use for this type of connection requirement?()

A. Junos Pulse should be configured with location awareness rules configured.

B. Odyssey Access Client should be installed with Host Checker configured to check the client‘s location.

C. Junos Pulse should be configured with all components installed.

D. Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

点击查看答案
第8题
Which two statements are true for a security policy? ()(Choose two.)

A. It controls inter-zone traffic.

B. It controls intra-zone traffic.

C. It is named with a system-defined name.

D. It controls traffic destined to the device‘s ingress interface.

点击查看答案
第9题
A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()

A.Configure roles based on departments and assign access based on source IP address.

B.Configure roles based on the user‘s manager and assign access based on the user‘s MAC address

C.Configure roles based on group memberships and assign a specific VLAN to the role.

D.Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.

点击查看答案
账号:
你好,尊敬的用户
复制账号
发送账号至手机
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改
欢迎分享答案

为鼓励登录用户提交答案,简答题每个月将会抽取一批参与作答的用户给予奖励,具体奖励活动请关注官方微信公众号:简答题

简答题官方微信公众号

警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“简答题”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

微信搜一搜
简答题
点击打开微信
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反简答题购买须知被冻结。您可在“简答题”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
微信搜一搜
简答题
点击打开微信