多项选择题
A.Mark permitted traffic for firewall user authentication.
B.Mark permitted traffic for SCREEN options.
C.Associate permitted traffic with an IPsec tunnel.
D.Associate permitted traffic with a NAT rule.
E.Mark permitted traffic for IDP processing.
单项选择题 A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()
单项选择题 Whichstatementdescribesthebehaviorofasecuritypolicy?()
多项选择题 Whichtwostatementsdescribethepurposeofasecuritypolicy?()