Addresses Book entries identify devices such as hosts and networks by their location in relation to:
A.
security zones
B.
existing access polices
C.
an interface on the firewall
D.
a listing of addresses in the ARP table
E.
a reachable network (via the routing table)
Explanation:
Before you can set up many of theNetScreenfirewall, VPN, and traffic shaping features, you need to define
addressesin one or more address lists. The address list for a security zone contains the IP addresses or domain
names1
of hosts or subnets whose traffic is either allowed, blocked, encrypted, or user-authenticated. On a singleNetScreendevice, you can configure multiple security zones, sectioning the network into segments to which you can apply various security options to satisfy the needs of each segment. At a minimum, you must define two security zones, basically to protect one area of the network from the other. On someNetScreenplatforms, you can define many security zones, bringing finer granularity to your network security design- and without deploying multiple security appliances to do so.
You can identify a security zone because it has an address book and can be referenced in policies.
I choose A