A.policy-rematch B.policy-evaluate C.rematch-policy D.evaluate-policy
单项选择题Whatisthepurposeofanaddressbook?()
A.It holds security policies for particular hosts. B.It holds statistics about traffic to and from particular hosts. C.It defines hosts in a zone so they can be referenced by policies. D.It maps hostnames to IP addresses to serve as a backup to DNS resolution.
单项选择题YouwanttocreateasecuritypolicyallowingtrafficfromanyhostintheTrustzonetohostb.example.com(172.19.1.1)intheUntrustzone.Howdoyoucreatethispolicy?()
A.Specify the IP address (172.19.1.1/32) as the destination address in the policy. B.Specify the DNS entry (hostb.example.com.) as the destination address in the policy. C.Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy. D.Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy
多项选择题Whichtwosecuritypolicyactionsarevalid?()
A.deny B.discard C.reject D.close
多项选择题Whichthreeadvancedpermitactionswithinsecuritypoliciesarevalid?()
A.Mark permitted traffic for firewall user authentication. B.Mark permitted traffic for SCREEN options. C.Associate permitted traffic with an IPsec tunnel. D.Associate permitted traffic with a NAT rule. E.Mark permitted traffic for IDP processing.
单项选择题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()
A.A B.B C.C D.D