搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【单选题】

A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST.<br /> However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone.<br /> Which configuration statement would correctly accomplish this task?()

A、from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

B、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

C、from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }

D、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

更多“ A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST.<br /> However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone.<br /> Which configuration statement would correctly accomplish this task?()”相关的问题
第3题

A、The network administrator can apply port security to dynamic access ports  B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.  C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.  D、The network administrator can apply port security to EtherChannels.  E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.  

点击查看答案
第4题

A、The network administrator can apply port security to dynamic access ports  B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.  C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.  D、The network administrator can apply port security to EtherChannels.  E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.  

点击查看答案
第5题

A、The network administrator can apply port security to dynamic access ports  B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.  C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.  D、The network administrator can apply port security to EtherChannels.  E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.  

点击查看答案
第7题

A、Dynamic routing is created adhoc and static routing cannot be changed once implemented.  B、Static routing is hard-coded and requires significant administrative overhead for large networks.  C、Static routing requires little administrative overhead and dynamic routing requires significant administrative overhead.  D、Dynamic routing is the best solution for small networks and static routing is the best solution for large scale networks.  

点击查看答案
第8题

AA. Computer Configuration\Software Settings\Software Installation  B、B. User Configuration\Software Settings\Software Installation  C、C. Computer Configuration\Administrative Templates\Windows Components\Windows Installer  D、D. User Configuration\Administrative Templates\Windows Components\Windows Installer  E、E. Computer Configuration\Administrative Templates\Windows Components\Windows Update  F、F. User Configuration\Administrative Templates\Windows Components\Windows Update  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服