Which two statements are true for a security policy? ()(Choose two.)
A. It controls inter-zone traffic.
B. It controls intra-zone traffic.
C. It is named with a system-defined name.
D. It controls traffic destined to the device‘s ingress interface.
A. It controls inter-zone traffic.
B. It controls intra-zone traffic.
C. It is named with a system-defined name.
D. It controls traffic destined to the device‘s ingress interface.
A.Configure roles based on departments and assign access based on source IP address.
B.Configure roles based on the user‘s manager and assign access based on the user‘s MAC address
C.Configure roles based on group memberships and assign a specific VLAN to the role.
D.Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.
A. Use the "is exactly" or "contains" operators.
B. Create a user filter matching thedn of the certificate.
C. Verify that the certificate is issued by a publicly trusted cs.
D. Match the certificate type and value with an attribute from theldap server.
A. The SurfControl server in the cloud provides the SRX device with the category of the URL as well as the reputation of the URL.
B. The SurfControl server in the cloud provides the SRX device with only the category of the URL.
C. The SurfControl server in the cloud provides the SRX device with only the reputation of the URL.
D. The SurfControl server in the cloud provides the SRX device with a decision to permit or deny the URL.
A. The bypass-routing parameter is ignored when using private IP addressing.
B. The telnet session will have the source IP address 10.10.10.1.
C. The telnet session will connect to the neighboring device‘s interface ge-1/1/0.
D. Return traffic for the telnet session might not arrive at interface ge-1/1/0.
A.dataintegrity
B.dataconfidentiality
C.dataauthentication
D.outerIPheaderconfidentiality
E.outerIPheaderauthentication
A.dataintegrity
B.dataconfidentiality
C.dataauthentication
D.outerIPheaderconfidentiality
E.outerIPheaderauthentication
A.Thesamekeyisusedforencryptionanddecryption.
B.Itiscommonlyusedtocreatedigitalcertificatesignatures.
C.Itusestwokeys:oneforencryptionandadifferentkeyfordecryption.
D.Anattackercandecryptdataiftheattackercapturesthekeyusedforencryption
A.IntheDHkeyexchangeprocess,thesessionkeyisneverpassedacrossthenetwork.
B.IntheDHkeyexchangeprocess,thepublicandprivatekeysaremathematicallyrelatedusingtheDH algorithm.
C.IntheDHkeyexchangeprocess,thesessionkeyispassedacrossthenetworktothepeerfor confirmation.
D.IntheDHkeyexchangeprocess,thepublicandprivatekeysarenotmathematicallyrelated,ensuring highersecurity
A.mode
B.presharedkey
C.externalinterface
D.securityproposals
E.deadpeerdetectionsettings
为了保护您的账号安全,请在“简答题”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!