多项选择题
Which three options represent IDP policy match conditions?()
A.protocol
B.source-address
C.port
D.application
E.attacks
相关考题
-
多项选择题
WhatarethreeconfigurationobjectsusedtobuildJUNOSIDPrules?()
A.zone objects
B.policy objects
C.attack objects
D.alert and notify objects
E.network and address objects -
多项选择题
WhichtwostatementsaretrueregardingIDP?()
A.IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
B.IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
C.IDP inspects traffic up to the Presentation layer.
D.IDP inspects traffic up to the Application layer. -
多项选择题
WhichthreestatementsaretrueregardingIDP?()
A.IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
B.IDP inspects traffic up to the Application layer.
C.IDP searches the data stream for specific attack patterns.
D.IDP inspects traffic up to the Presentation layer.
E.IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.
