CMS专题

多选题Which three represent IDP policy match conditions? ()(Choose three.)AprotocolBsource-addressCportDapplicationEattacks

题目
多选题
Which three represent IDP policy match conditions? ()(Choose three.)
A

protocol

B

source-address

C

port

D

application

E

attacks

参考答案和解析
正确答案: D,C
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

A. zone objects

B. policy objects

C. attack objects

D. alert and notify objects

E. network and address objects


参考答案:A, C, E

第2题:

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

A. access profile

B. client group

C. client

D. default profile

E. external


参考答案:A, B, C

第3题:

Which three contexts can be used as matching conditions in a source NAT configuration? ()(Choose three.)

A. routing-instance

B. zone

C. interface

D. policy

E. rule-set


参考答案:A, B, C

第4题:

Which three statements are true about terms in a policy?()

  • A、The order of the terms in a policy is irrelevant.
  • B、The action is specified in a then statement.
  • C、Terms are optional in a policy.
  • D、The match condition can be identified with a from statement.
  • E、A from statement is mandatory in a term.

正确答案:B,C,D

第5题:

Which three options represent IDP policy match conditions?()

  • A、protocol
  • B、source-address
  • C、port
  • D、application
  • E、attacks

正确答案:B,D,E

第6题:

Which three parameters are configured in the IKE policy? ()(Choose three.)

A. mode

B. preshared key

C. external interface

D. security proposals

E. dead peer detection settings


参考答案:A, B, D

第7题:

Which three statements are true about terms in a policy?()

  • A、The order of the terms in a policy is irrelevant
  • B、The action is specified in a then statement
  • C、Ters are optional in a policy
  • D、The match condition can be identified with a from statement
  • E、Every policy must contain at least one term

正确答案:B,D,E

第8题:

Which three represent IDP policy match conditions? ()(Choose three.)

A.protocol

B.source-address

C.port

D.application

E.attacks


参考答案:B, D, E

第9题:

Which three packet interception methods are configurable in WX devices?() (Choose three.)

  • A、OSPF
  • B、WCCP
  • C、policy based routing
  • D、route injection using RIPv1
  • E、route injection using RIPv2

正确答案:B,C,E

第10题:

Which three options represent IDP policy match conditions? ()(Choose three.)

  • A、service
  • B、to-zone
  • C、attacks
  • D、port
  • E、destination-address

正确答案:B,C,E

更多相关问题