JN0-330

多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS

题目
多选题
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
A

ping

B

FTP

C

Telnet

D

HTTP

E

HTTPS

参考答案和解析
正确答案: C,B
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three advanced permit actions within security policies are valid?() (Choose three.)

A. Mark permitted traffic for firewall user authentication.

B. Mark permitted traffic for SCREEN options.

C. Associate permitted traffic with an IPsec tunnel.

D. Associate permitted traffic with a NAT rule.

E. Mark permitted traffic for IDP processing.


参考答案:A, C, E

第2题:

On which three traffic types does firewall pass-through authentication work? ()(Choose three.)

A. ping

B. FTP

C. Telnet

D. HTTP

E. HTTPS


参考答案:B, C, D

第3题:

Which three types of integration does the Business Event System support?() (Choose three.)

A. point-to-point

B. parent/child messaging

C. messaging hub system

D. distributed applications messaging

E. simple object access protocol (SOAP) messaging


参考答案:A, C, D

第4题:

Which two traffic types trigger pass-through firewall user authentication?()

  • A、SSH
  • B、Telnet
  • C、ICMP
  • D、OSPF
  • E、HTTP

正确答案:B,E

第5题:

Which three statistics does the Executive report summarize?() (Choose three.)

  • A、latency and loss
  • B、compression results
  • C、traffic (by application)
  • D、CRC and alignment errors
  • E、user access (by username)

正确答案:A,B,C

第6题:

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

A. access profile

B. client group

C. client

D. default profile

E. external


参考答案:A, B, C

第7题:

Which three ports does a WX device use for control traffic purposes?() (Choose three.)

A. 3577 UDP

B. 3578 UDP

C. 3678 UDP

D. 3577 TCP

E. 3578 TCP


参考答案:B, D, E

第8题:

Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)

A. MIME pattern

B. file extension

C. IP spoofing

D. POP3

E. protocol command


参考答案:A, B, E

第9题:

On which three traffic types does firewall pass-through authentication work? ()(Choose three.)

  • A、ping
  • B、FTP
  • C、Telnet
  • D、HTTP
  • E、HTTPS

正确答案:B,C,D

第10题:

Which three advanced permit actions within security policies are valid?() (Choose three.)

  • A、Mark permitted traffic for firewall user authentication.
  • B、Mark permitted traffic for SCREEN options.
  • C、Associate permitted traffic with an IPsec tunnel.
  • D、Associate permitted traffic with a NAT rule.
  • E、Mark permitted traffic for IDP processing.

正确答案:A,C,E

更多相关问题