更多"What are three firewall filter term"的相关试题:
[多项选择]What are three terminating actions for firewall filters?()
A. reject
B. drop
C. permit
D. accept
E. discard
[单项选择]Which of the following actions is not what the I. O.C. will take to deal with the drugs
A. Do the testing without giving any information.
B. Federalize the sports federations together
C. Do the testing that can detect all kind of drugs.
D. Do the testing out of the competition.
[多项选择]What are three actions performed by the mysql_secure_installation tool?()
A. It prompts you to set the root user account password
B. It checks whether file permissions are appropriate within datadir
C. It asks to remove the test database, which is generated at installation time
D. It can delete any anonymous accounts
E. It verifies that all users are configuration with the longer password hash
[多项选择]Which three advanced permit actions within security policies are valid?() (Choose three.)
A. Mark permitted traffic for firewall user authentication.
B. Mark permitted traffic for SCREEN options.
C. Associate permitted traffic with an IPsec tunnel.
D. Associate permitted traffic with a NAT rule.
E. Mark permitted traffic for IDP processing.
[多项选择]Which three actions must you perform as part of the WXOS software upgrade process?()(Choose three.)
A. Reboot the device.
B. Reapply the license key.
C. Save the current configuration.
D. Load the image using FTP, TFTP, or from the local disk.
E. Back up the configration using FTP, TFTP, or to the local disk
[多项选择]Which three actions are required to configure the Flashback Database? ()
A. set Flash Recovery Area
B. enable Flashback logging
C. create FLASHBACK tablespace
D. start the database in the ARCHIVELOG mode
E. start the database in the NOARCHIVELOG mode
[多项选择]Which two firewall filter actions will terminate the processing and evaluation of a packet?()
A. permit
B. accept
C. deny
D. discard
[多项选择]Which three actions can a branch SRX Series device perform on a spam e-mail message?() (Choose three.)
A. It can drop the connection at the IP address level
B. It can block the e-mail based upon the sender ID
C. It can allow the e-mail and bypass all UTM inspection
D. It can allow the e-mail to be forwarded, but change the intended recipient to a new e-mail address
E. It can allow the e-mail to be forwarded to the destination, but tag it with a custom value in the subject line
[多项选择]Which three actions are allowed in event details? ()(Choose three.)
A. Send
B. Raise
C. Delete
D. Receive
E. Acknowledge
[多项选择]What are three different integrated UTM components available on the branch SRX Series devices?() (Choose three.)
A. antivirus (full AV, express AV)
B. antivirus (desktop AV)
C. Web filtering
D. antispam
E. firewall user authentication
[多项选择]What are two valid actions for a routing policy?()
A. discard
B. next policy
C. accept
D. ignore
[多项选择]What are three characteristics of a service tunnel? ()(Choose three.)
A. It is bidirectional.
B. It carries optimized traffic.
C. It can carry traffic using UDP.
D. It is formed only within a community
[多项选择]What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
A. zone objects
B. policy objects
C. attack objects
D. alert and notify objects
E. network and address objects
[多项选择]What are three characteristics of NSC technology? ()(Choose three.)
A. NSC operates at the file level.
B. NSC operates at the byte level.
C. NSC uses hard drives to store longer patterns.
D. NSC retains learned patterns for a longer time.
E. NSC is available only on platforms with dual hard drives.
[多项选择]What are three characteristics of the OSPF routing protocol? ()
A. It converges quickly.
B. OSPF is a classful routing protocol.
C. It uses cost to determine the best route.
D. It uses the DUAL algorithm to determine the best route.
E. OSPF routers send the complete routing table to all directly attached routers.
F. OSPF routers discover neighbors before exchanging routing information.
[多项选择]What are the three specific characteristics of the Cisco SAN solution for the data center? ()(Choosethree.)
A. It provides multiprotocol support.
B. It provides improved availability, strong security, and business continuance measures.
C. It enables you to connect Cisco VSAN technology and DAS technology.
D. It reduces cost and complexity by providing an easy transition to evolving technologies.
E. It allows you to create separate networks on the VSAN.
F. It allows you to migrate to new technologies without a complete equipment upgrade.