ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 100 - JN0-636 discussion

Report
Export

Refer to the exhibit,

which two potential violations will generate alarm ? (Choose Two)

A.
the number of policy violations by a source network identifier
Answers
A.
the number of policy violations by a source network identifier
B.
the ratio of policy violation traffic compared to accepted traffic.
Answers
B.
the ratio of policy violation traffic compared to accepted traffic.
C.
the number of policy violation by a destination TCP port
Answers
C.
the number of policy violation by a destination TCP port
D.
the number of policy violation to an application within a specified period
Answers
D.
the number of policy violation to an application within a specified period
Suggested answer: A, D

Explanation:

The exhibit shows a security policy configuration with a threshold of 1000 policy violations by a source network identifier and a threshold of 10 policy violations to an application within a specified period. If either of these thresholds are exceeded, an alarm will be generated. Therefore, the correct answer is A and D. The other options are incorrect because:

B) The ratio of policy violation traffic compared to accepted traffic is not a criterion for triggering an alarm. The security policy configuration does not specify any ratio or percentage of policy violation traffic that would cause an alarm.

C) The number of policy violation by a destination TCP port is also not a criterion for triggering an alarm. The security policy configuration does not specify any threshold or duration for policy violation by a destination TCP port.

Reference:

policy (Security Alarms)

Monitoring Security Policy Violations

asked 18/09/2024
taheireem shaikh
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first