A. data integrity B. data confidentiality C. data authentication D. outer IP header confidentiality E. outer IP header authentication
多项选择题Which three options represent IDP policy match conditions? ()(Choose three.)
A.service B.to-zone C.attacks D.port E.destination-address
多项选择题Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
A. VPN establishment B. stateful ARP lookups C. Dynamic ARP inspection D. Network Address Translation E. inspection of packets at higher levels (Layer 4 and above)
单项选择题Which configuration shows the correct application of a security policy scheduler?()
A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } scheduler-name now; } } } B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; } C. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn scheduler-name now; } } } } D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; scheduler-name now; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }myTunnel;
多项选择题Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
A. Traffic is permitted from the trust zone to the untrust zone. B. Intrazone traffic in the trust zone is permitted. C. All traffic through the device is denied. D. The policy is matched only when no other matching policies are found.
多项选择题Which three represent IDP policy match conditions? ()(Choose three.)
A.protocol B.source-address C.port D.application E.attacks