Which traffic will be examined for attacks?

Refer to the Exhibit.
— Exhibit –

— Exhibit —
You have configured an IDP policy as shown in the exhibit. The configuration commits
successfully. Which traffic will be examined for attacks?

Refer to the Exhibit.
— Exhibit –

— Exhibit —
You have configured an IDP policy as shown in the exhibit. The configuration commits
successfully. Which traffic will be examined for attacks?

A.
only originating traffic from source to destination in a session

B.
only reply traffic from destination to source in a session

C.
both originating and reply traffic between hosts in a session

D.
recommended traffic between the source and destination hosts

Explanation:

Reference:http://www.juniper.net/techpubs/software/junos-security/junos-security96/junossecurity-swconfig-security/config-idp-ips-rulebase-section.html#config-idp-ips-rulebase-section



Leave a Reply 0

Your email address will not be published. Required fields are marked *