多项选择题
What are three configuration objects used to build JUNOS IDP rules?()
A.zone objects
B.policy objects
C.attack objects
D.alert and notify objects
E.network and address objects
相关考题
-
多项选择题
WhichtwostatementsaretrueregardingIDP?()
A.IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
B.IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
C.IDP inspects traffic up to the Presentation layer.
D.IDP inspects traffic up to the Application layer. -
多项选择题
WhichthreestatementsaretrueregardingIDP?()
A.IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
B.IDP inspects traffic up to the Application layer.
C.IDP searches the data stream for specific attack patterns.
D.IDP inspects traffic up to the Presentation layer.
E.IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected. -
多项选择题
Whichtwostatementsaretrueregardingredundancygroups?()
A.When priority settings are equal and the members participating in a cluster are initialized at the same time, the primary role for redundancy group 0 is assigned to node 0.
B.The preempt option determines the primary and secondary roles for redundancy group 0 during a failure and recovery scenario.
C.Redundancy group 0 manages the control plane failover between the nodes of a cluster.
D.The primary role can be shared for redundancy group 0 when the active-active option is enabled
