Refer to the Exhibit.
— Exhibit –
— Exhibit —
You have configured an IDP policy as shown in the exhibit. The configuration commits
successfully. Which traffic will be examined for attacks?
A.
only originating traffic from source to destination in a session
B.
only reply traffic from destination to source in a session
C.
both originating and reply traffic between hosts in a session
D.
recommended traffic between the source and destination hosts
Explanation:
Reference:http://www.juniper.net/techpubs/software/junos-security/junos-security96/junossecurity-swconfig-security/config-idp-ips-rulebase-section.html#config-idp-ips-rulebase-section