ExamGecko
Question list
Search
Search

Question 1 - JN0-231 discussion

Report
Export

Which two criteria should a zone-based security policy include? (Choose two.)

A.
a source port
Answers
A.
a source port
B.
a destination port
Answers
B.
a destination port
C.
zone context
Answers
C.
zone context
D.
an action
Answers
D.
an action
Suggested answer: A, B

Explanation:

A security policy is a set of statements that controls traffic from a specified source to a specified destination using a specified service. A policy permits, denies, or tunnels specified types of traffic unidirectionally between two points.

Each policy consists of:

A unique name for the policy.

A from-zone and a to-zone, for example: user@host# set security policies from-zone untrust to-zone untrust A set of match criteria defining the conditions that must be satisfied to apply the policy rule. The match criteria are based on a source IP address, destination IP address, and applications. The user identity firewall provides greater granularity by including an additional tuple, source-identity, as part of the policy statement.

A set of actions to be performed in case of a match—permit, deny, or reject.

Accounting and auditing elements—counting, logging, or structured system logging.

https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/topicmap/security-policy-configuration.html

asked 18/09/2024
Vaibhav Damle
44 questions
NextNext
User
Your answer:
0 comments
Sorted by

Leave a comment first