多项选择题
Which two security policy actions are valid?()
A.deny
B.discard
C.reject
D.close
点击查看答案
相关考题
-
多项选择题
Whichthreeadvancedpermitactionswithinsecuritypoliciesarevalid?()
A.Mark permitted traffic for firewall user authentication.
B.Mark permitted traffic for SCREEN options.
C.Associate permitted traffic with an IPsec tunnel.
D.Associate permitted traffic with a NAT rule.
E.Mark permitted traffic for IDP processing. -
单项选择题
A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()
A.A
B.B
C.C
D.D -
单项选择题
Whichstatementdescribesthebehaviorofasecuritypolicy?()
A.The implicit default security policy permits all traffic.
B.Traffic destined to the device itself always requires a security policy.
C.Traffic destined to the device’s incoming interface does not require a security policy.
D.The factory-default configuration permits all traffic from all interfaces.
