protocol
source-address
port
application
attacks
第1题:
A. zone objects
B. policy objects
C. attack objects
D. alert and notify objects
E. network and address objects
第2题:
A. access profile
B. client group
C. client
D. default profile
E. external
第3题:
A. routing-instance
B. zone
C. interface
D. policy
E. rule-set
第4题:
Which three statements are true about terms in a policy?()
第5题:
Which three options represent IDP policy match conditions?()
第6题:
A. mode
B. preshared key
C. external interface
D. security proposals
E. dead peer detection settings
第7题:
Which three statements are true about terms in a policy?()
第8题:
A.protocol
B.source-address
C.port
D.application
E.attacks
第9题:
Which three packet interception methods are configurable in WX devices?() (Choose three.)
第10题:
Which three options represent IDP policy match conditions? ()(Choose three.)