Which two statements are true regarding IDP?()A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP cannot be used in conjunction with other JUNOS Software security features su

题目

Which two statements are true regarding IDP?()

  • A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
  • B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
  • C、IDP inspects traffic up to the Presentation layer.
  • D、IDP inspects traffic up to the Application layer.

相似考题
更多“Which two statements are true regarding IDP?()A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP cannot be used in conjunction with other JUNOS Software security features su”相关问题
  • 第1题:

    Which statement is true regarding proxy ARP?()

    • A、Proxy ARP is enabled by default on stand-alone JUNOS security devices.
    • B、Proxy ARP is enabled by default on chassis clusters.
    • C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.
    • D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

    正确答案:D

  • 第2题:

    Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()

    • A、JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.
    • B、JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.
    • C、JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.
    • D、JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

    正确答案:B,C

  • 第3题:

    Which three statements are true regarding IDP?()

    • A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
    • B、IDP inspects traffic up to the Application layer.
    • C、IDP searches the data stream for specific attack patterns.
    • D、IDP inspects traffic up to the Presentation layer.
    • E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

    正确答案:B,C,E

  • 第4题:

    Which two statements about zoning are correct? ()

    • A、Zoning increases security.
    • B、DNS queries are used for software zoning.
    • C、Software zoning is more secure than hardware zoning.
    • D、When using zones and VSANs together, the zone is created first.
    • E、Zoning requires that VSANs be established before it becomes operational.

    正确答案:A,B

  • 第5题:

    Which two functions of JUNOS Software are handled by the data plane?()

    • A、NAT
    • B、OSPF
    • C、SNMP
    • D、SCREEN options

    正确答案:A,D

  • 第6题:

    Which three JUNOS software features allow for increased security on your network?()

    • A、firewall filters
    • B、data encryption
    • C、routing protocol authentication
    • D、support for BGP path mtu discovery
    • E、automatic discovery for IPSEC neighbors

    正确答案:A,B,C

  • 第7题:

    Which two statements are true regarding proxy ARP?()

    • A、Proxy ARP is enabled by default.
    • B、Proxy ARP is not enabled by default.
    • C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.
    • D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

    正确答案:B,D

  • 第8题:

    Regarding zone types, which statement is true?()

    • A、You cannot assign an interface to a functional zone.
    • B、You can specifiy a functional zone in a security policy.
    • C、Security zones must have a scheduler applied.
    • D、You can use a security zone for traffic destined for the device itself.

    正确答案:D

  • 第9题:

    多选题
    You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()
    A

    activating a JUNOS Software commit script

    B

    configuring an IDP groups statement

    C

    setting up a chassis cluster

    D

    downloading the IDP policy templates

    E

    installing the policy templates


    正确答案: E,C
    解析: 暂无解析

  • 第10题:

    多选题
    Cisco Catalyst 4500 Series switches are attractive to medium-size campuses with growth opportunities due to the switches enhanced security and which two other features? ()
    A

    enhanced multilayer software image

    B

    connectivity to multiple types of WAN connections

    C

    Cisco Unified Communications Manager

    D

    QoS for converged networks

    E

    modular, customizable components


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()
    A

    JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.

    B

    JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.

    C

    JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.

    D

    JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.


    正确答案: B,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which three statements are true regarding IDP?()
    A

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP inspects traffic up to the Application layer.

    C

    IDP searches the data stream for specific attack patterns.

    D

    IDP inspects traffic up to the Presentation layer.

    E

    IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    Which two design goals describe the Junos OS design?()

    • A、clean separation of security and routing policies
    • B、clean separation of control and forwarding planes
    • C、modularization of multiple software processes
    • D、a single hardware platform for all software applications

    正确答案:B,C

  • 第14题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第15题:

    Which statement regarding the implementation of an IDP policy template is true?()

    • A、IDP policy templates are automatically installed as the active IDP policy.
    • B、IDP policy templates are enabled using a commit script.
    • C、IDP policy templates can be downloaded without an IDP license.
    • D、IDP policy templates are included in the factory-default configuration.

    正确答案:B

  • 第16题:

    You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()

    • A、activating a JUNOS Software commit script
    • B、configuring an IDP groups statement
    • C、setting up a chassis cluster
    • D、downloading the IDP policy templates
    • E、installing the policy templates

    正确答案:A,D,E

  • 第17题:

    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

    • A、[edit security idp]
    • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
    • C、[edit security zones security-zone trust]
    • D、[edit security screen]

    正确答案:B,C

  • 第18题:

    Which two statements about JUNOS Software packet handling are correct?()

    • A、JUNOS Software applies service ALGs only for the first packet of a flow.
    • B、JUNOS Software uses fast-path processing only for the first packet of a flow.
    • C、JUNOS Software performs route and policy lookup only for the first packet of a flow.
    • D、JUNOS Software applies SCREEN options for both first and consecutive packets of a flow.

    正确答案:C,D

  • 第19题:

    Which two statements are true regarding firewall user authentication?()

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
    • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

    正确答案:B,C

  • 第20题:

    多选题
    Which three JUNOS software features allow for increased security on your network?()
    A

    firewall filters

    B

    data encryption

    C

    routing protocol authentication

    D

    support for BGP path mtu discovery

    E

    automatic discovery for IPSEC neighbors


    正确答案: E,B
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true regarding IDP?()
    A

    IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.

    C

    IDP inspects traffic up to the Presentation layer.

    D

    IDP inspects traffic up to the Application layer.


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    多选题
    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
    A

    [edit security idp]

    B

    [edit security zones security-zone trust interfaces ge-0/0/0.0]

    C

    [edit security zones security-zone trust]

    D

    [edit security screen]


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two design goals describe the Junos OS design?()
    A

    clean separation of security and routing policies

    B

    clean separation of control and forwarding planes

    C

    modularization of multiple software processes

    D

    a single hardware platform for all software applications


    正确答案: D,A
    解析: 暂无解析