Regarding the description of Windows Firewall, which of the following options are correct? (Multiple Choice)
Regarding the description of Windows Firewall, which of the following options are correct? (Multiple Choice)A . Windows Firewall can only allow or prohibit preset programs or functions and programs installed on the system, and cannot customize the release rules according to the protocol or port number.B . Windows Firewall not only allows or prohibits preset programs or...
Except built-in Portal authentication, firewall also supports custom Portal authentication, when using a custom Portal authentication, no need to deploy a separate external Portal server.
Except built-in Portal authentication, firewall also supports custom Portal authentication, when using a custom Portal authentication, no need to deploy a separate external Portal server.A . TrueB . FalseView AnswerAnswer: B
Classify servers based on the shape, what types of the following can be divided into? (Multiple choice)
Classify servers based on the shape, what types of the following can be divided into? (Multiple choice)A . Blade serverB . Tower serverC . Rack serverD . X86 serverView AnswerAnswer: ABC
Evidence identification needs to resolve the integrity verification of the evidence and determine whether it meets the applicable standards. Which of the following statements is correct about the standard of evidence identification?
Evidence identification needs to resolve the integrity verification of the evidence and determine whether it meets the applicable standards. Which of the following statements is correct about the standard of evidence identification?A . Relevance criterion means that if the electronic evidence can have a substantial impact on the facts of...
Regarding the firewall security policy, which of the following options is wrong?
Regarding the firewall security policy, which of the following options is wrong?A . If the security policy is permit, the discarded message will not accumulate the number of hits.B . When configuring the security policy name, you cannot reuse the same name.C . Adjust the order of security policies with...
Regarding the AH and ESP security protocols, which of the following options is correct? (Multiple Choice)
Regarding the AH and ESP security protocols, which of the following options is correct? (Multiple Choice)A . AH can provide encryption and verification functionsB . ESP can provide encryption and verification functionsC . The agreement number of AH is 51.D . The agreement number of ESP is 51.View AnswerAnswer: BC
When configuring security policy, a security policy can reference an address set or configure multiple destination IP addresses.
When configuring security policy, a security policy can reference an address set or configure multiple destination IP addresses.A . TrueB . FalseView AnswerAnswer: A
Under the tunnel encapsulation mode, IPSec configuration does not need to have a route to the destination private network segment, because the data will be re-encapsulated using the new IP header to find the routing table.
Under the tunnel encapsulation mode, IPSec configuration does not need to have a route to the destination private network segment, because the data will be re-encapsulated using the new IP header to find the routing table.A . TrueB . FalseView AnswerAnswer: B
Some applications, such as Oracle database application, there is no data transfer for a long time, so that firewall session connection is interrupted, thus resulting in service interruption, which of the following technology can solve this problem?
Some applications, such as Oracle database application, there is no data transfer for a long time, so that firewall session connection is interrupted, thus resulting in service interruption, which of the following technology can solve this problem?A . Configure a long business connectionB . Configure default session aging timeC ....
When configuring NAT Server on the USG series firewall, the server-map table will be generated. Which of the following does not belong in the table?
When configuring NAT Server on the USG series firewall, the server-map table will be generated. Which of the following does not belong in the table?A . Destination IPB . Destination port numberC . Agreement numberD . Source IPView AnswerAnswer: D