题目内容 (请给出正确答案)
[主观题]

You have a firewall enforcer protecting resources in a data center. A user is experiencing

difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()

A. Resource access policy on the MAG Series device

B. IPsec routing policy on the MAG Series device

C. General traffic policy blocking access through the firewall enforcer

D. Auth table entry on the firewall enforcer

查看答案
如搜索结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能会需要:
您的账号:
发送账号密码至手机
发送
更多“You have a firewall enforcer p…”相关的问题

第1题

According to what you have read, the author's probable preference will he ______.A.walling

According to what you have read, the author's probable preference will he ______.

A.walling for the coming of better firewall products,

B.finding a combination of both application gateway and packet filtering approach

C.meeting demands of every type with better products

D.implementing one better approach in the adoption of a firewall solution

点击查看答案

第2题

You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()

A. as an outbound filter on interface fxp0

B. as an outbound filter on interface lo0

C. as an inbound filter on interface fxp0

D. as an inbound filter on interface lo0

点击查看答案

第3题

Your network contains an Active Directory domain. The domain contains two servers named Se
rver1 and Server2. All servers run Windows Server 2008 R2 and have Windows Firewall turned on. You need to ensure that you can use Event Viewer on Server2 to access the Application log on Server1. What should you do?()

A. On Server2, create a new event subscription.

B. On Server2, modify the outbound firewall rules.

C. On Server1, modify the inbound firewall rules.

D. On Server1, modify the settings on the Application log.

点击查看答案

第4题

You have a firewall enforcer protecting sensitive internal resources in a data center. The
network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()

A. resource access policies

B. Host Enforcer policies

C. source IP enforcement policies

D. IPsec enforcement policies

点击查看答案

第5题

You have a server that runs windows server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do?()

A.From windows firewall, add an exception.

B.From windows firewall enable the block all incoming connections option.

C.From the windows firewall with advanced security snap-in, create an inbound rule.

D.From the windows firewall with advanced security snap-in, create an outbound rule.

点击查看答案

第6题

You have been asked to configure a login class which will permit its users to view and edi
t the configuration. The class should only allow the configuration of the interfaces and firewall heirarchies. Which configuration correctly accomplishes this?()

You have been asked to configure a login class whi

A.A

B.B

C.C

D.D

点击查看答案

第7题

You have a firewall filter applied in an inbound direction on a customer interface. You wo
uld like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()

A. then reject

B. then discard

C. then next filter

D. then silent-drop

点击查看答案

第8题

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access
Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

A. CLI

B. WebUI

C. NSM

D. Junos Pulse Access Control Service

点击查看答案

第9题

Your company runs Remote Desktop Services. All client computers run Windows XP SP3. You ha
ve a Remote Desktop Session Host (RD Session Host) server.You need to ensure that users can print by using Easy Print while connected to the RD Session Host server.What should you do on the client computers?()

A.Install .NET Framework 3.5.

B.Enable Network Level Authentication (NLA)

C.Enable a Windows Firewall Inbound Rule for File and Printer Sharing.

D.Enable a Windows Firewall Outbound Rule for File and Printer Sharing.

点击查看答案

第10题

Your network contains one Active Directory domain. You have a member server that runs Wind
ows Server 2008 R2.You need to immediately disable all incoming connections to the server.What should you do?()

A. From the Services snap-in, disable the IP Helper.

B. From the Services snap-in, disable the Netlogon service.

C. From Windows Firewall, enable the Block all connections option on the Public Profile.

D. From Windows Firewall, enable the Block all connections option on the Domain Profile.

点击查看答案
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改
温馨提示
每个试题只能免费做一次,如需多次做题,请购买搜题卡
立即购买
稍后再说
警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“赏学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

微信搜一搜
赏学吧
点击打开微信
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反赏学吧购买须知被冻结。您可在“赏学吧”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
微信搜一搜
赏学吧
点击打开微信