CMS专题

多选题Which two statements describe the purpose of a security policy?()AIt enables traffic counting and logging.BIt enforces a set of rules for transit traffic.CIt controls host inbound services on a zone.DIt controls administrator rights to access the devic

题目
多选题
Which two statements describe the purpose of a security policy?()
A

It enables traffic counting and logging.

B

It enforces a set of rules for transit traffic.

C

It controls host inbound services on a zone.

D

It controls administrator rights to access the device.

参考答案和解析
正确答案: B,D
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第2题:

A datacenter director implements a new security measure in response to multiple equipment thefts from the datacenter. The new security measure requires people entering or leaving the data center to go through an extra secure area. Once entering the area people must present two forms of authentication to leave. Which of the following security measures does this describe?()

  • A、Mantrap
  • B、RFID cards
  • C、Defense in depth
  • D、Biometrics

正确答案:A

第3题:

Which two design goals describe the Junos OS design?()

A. clean separation of security and routing policies

B. clean separation of control and forwarding planes

C. modularization of multiple software processes

D. a single hardware platform for all software applications


参考答案:B, C

第4题:

Which two of these statements best describe the benefits of WPAv1? ()

  • A、 SSID broadcast prevention
  • B、 Improved mutual authentication
  • C、 Improved encryption through AES
  • D、 Improved protection against sniffing initialization vectors
  • E、 RF jamming prevention

正确答案:B,D

第5题:

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

  • A、It specifies use of a static encryption key that must be changed frequently to enhance security
  • B、It requires use of an open authentication method
  • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection
  • D、It requires that all access points and wireless devices use the same encryption key
  • E、It includes authentication by PSK

正确答案:C,E

第6题:

Which two of these statements best describe the benefits of WPAv2? (Choose two.)()

  • A、 SSID broadcast prevention
  • B、 man-in-the-middle attack protection
  • C、 cost reduction through software upgrades in all existing hardware
  • D、 dynamic key generation
  • E、 RF jamming prevention

正确答案:B,D

第7题:

Which two design goals describe the Junos OS design?()

  • A、clean separation of security and routing policies
  • B、clean separation of control and forwarding planes
  • C、modularization of multiple software processes
  • D、a single hardware platform for all software applications

正确答案:B,C

第8题:

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

A.It specifies use of a static encryption key that must be changed frequently to enhance security

B.It requires use of an open authentication method

C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection

D.It requires that all access points and wireless devices use the same encryption key

E.It includes authentication by PSK


参考答案:C, E

第9题:

Which two statements accurately describe an IBGP peering session?() (Choose two.)

  • A、Peers are statically defined.
  • B、Peers exist within the same AS.
  • C、Peers must be directly connected to each other.
  • D、Peers advertise routes learned from other IBGP neighbors.

正确答案:A,B

第10题:

Which two statements describe the advantages to the use of RIP over the use of OSPF?()

  • A、RIP requires less time to converge
  • B、RIP uses less bandwidth
  • C、RIP is less complex to configure
  • D、RIP demands fewer router resources
  • E、RIP has a more accurate metric

正确答案:C,D

更多相关问题