搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【多选题】

Which two firewall filter actions will terminate the processing and evaluation of a packet?()

A、permit

B、accept

C、deny

D、discard

更多“Which two firewall filter actions will terminate the processing and evaluation of a packet?()”相关的问题
第1题

A、Firewall filters are stateless.  B、Firewall filters are used to control routing information that is exchanged between devices.  C、Firewall filters are used to control traffic passing through the device.  D、Firewall filters can only be applied to traffic entering the device.  

点击查看答案
第3题

A、show access firewall-authentication  B、show security firewall-authentication users  C、show security audit log  D、show security firewall-authentication history  

点击查看答案
第5题

A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.  B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.  C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .  D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.  

点击查看答案
第6题

A、A client group is a list of clients associated with a group.  B、A client group is a list of groups associated with a client.  C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.  D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.  

点击查看答案
第7题

A、MX Series  B、EX Series  C、SRX Series  D、QFX Series  

点击查看答案
第8题

A、rate limiting of ICMP  B、RADIUS authorizations  C、source address validation  D、stateful firewall on the router  

点击查看答案
第9题

A、high scalability  B、the design supports a layered security model  C、firewall addressing does not need to change  D、IPsec decrypted traffic is inspected by the firewall  E、there is a centralized point for logging and content inspection  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服