C. zone context and D. an action
Explanation:
Zone context: A zone-based security policy defines rules based on zones, which group interfaces with similar security requirements. The policy needs to specify the source and destination zones to determine the flow of traffic between them.
Action: Every security policy includes an action to specify what should happen when the traffic matches the policy. Actions typically include allow, deny, or log.
Other options:
Source port and destination port: While these can be part of a policy, they are not required criteria for a zone-based security policy. The primary elements of such a policy are zones and the action to take.
A security policy is a set of statements that controls traffic from a specified source to a specified destination using a specified service. A policy permits, denies, or tunnels specified types of traffic unidirectionally between two points.
Each policy consists of:
A unique name for the policy.
A from-zone and a to-zone, for example: user@host# set security policies from-zone untrust to-zone untrust
A set of match criteria defining the conditions that must be satisfied to apply the policy rule. The match criteria are based on a source IP address, destination IP address, and applications. The user identity firewall provides greater granularity by including an additional tuple, source-identity, as part of the policy statement.
A set of actions to be performed in case of a match—permit, deny, or reject.
Accounting and auditing elements—counting, logging, or structured system logging.
~~~~Action is not a match criteria
https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/topic-map/security-policy-configuration.html
In a Junos OS stateful firewall, the security policies enforce rules for transit traffic, in terms of what traffic can pass through the firewall, and the actions that need to take place on traffic as it passes through the firewall. From the perspective of security policies, the traffic enters one security zone and exits another security zone. This combination of a from-zone and to-zone is called a context. Each context contains an ordered list of policies. Each policy is processed in the order that it is defined within a context.
I think it’s src and dst
https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/topic-map/security-policy-configuration.html
upvoted 2 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
gpt_test
2 months, 2 weeks agoquraitulain
7 months, 3 weeks agowesth4m1234
8 months, 2 weeks agolonganghi
8 months, 3 weeks agoJaredM
9 months, 1 week agoEngg_flint
1 year, 1 month agoTaweke
1 year, 5 months agofosi130
1 year, 6 months agoRbrahmi
1 year, 9 months agobigmokey
1 year, 10 months agomohdema
1 year, 12 months agomohdema
1 year, 12 months agoBubu3k
2 years agomohdema
1 year, 12 months ago