多项选择题
You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.
Which inbound traffic should be allowed? ()
A. VPN Traffic
B. DNS Traffic
C. LDAP Traffic
D. HTTP Traffic
E. HTTPS Traffic
F. Traffic from the network address of 192.168.10/24
相关考题
-
单项选择题
You are designing the configuration of the external DNS server to meet the business and technical requirements. What should you do? ()
A. Configure a root zone on the external DNS server.
B. Configure a stub zone for.com on the external dns server.
C. Configure the external DNS server to use the default root hints.
D. Configure the External DNS server to use the ISP’S DNS server as a forwarder. -
多项选择题
YouaredesigningtheIPaddressassignmentstrategyfortheVPNusers.Whichtwoactionsshouldyouperform.()
A. Configure VPN1 as a DHCP Relay Agent.
B. Configure VPN1 to assign IP Address by using DHCP server.
C. Configure VPN1 to have a static pool of IP Address from the network address of 131.107.1.0/24.
D. Configure VPN1 to have a static pool of IP Address from the network address of 192.168.1.0/24.
E. Configure the perimeter firewall to allow inbound DHCP traffic to be passed to VPN1.
F. Configure the interval firewall to allow DHCP broadcasts to be forwarded from the external network to the internal network. -
多项选择题
You are designing a strategy to allow internal users in Dallas to resolve domain names. What are three possible ways to achieve the goal?()
A. Configure the internal DNS server to have a root zone.
B. Configure the Dallas DNS server to use the default root hints.
C. Configure the Dallas DNS server to forward all request for the external namespace to the external DNS server.
D. Create a caching-only DNS server on the perimeter network.
E. Create a stub zone for the external namespace on the Dallas DNS server.