Typical remote authentication modes are: (Multiple Choice)
Typical remote authentication modes are: (Multiple Choice)A . RADIUSB . LocalC . HWTACACSD . LLDPView AnswerAnswer: AC
Which of the following are the ways in which a PKI entity applies for a local certificate from CA? (Multiple Choice)
Which of the following are the ways in which a PKI entity applies for a local certificate from CA? (Multiple Choice)A . Online applicationB . Local applicationC . Network applicationD . Offline applicationView AnswerAnswer: AD
Which of the following protection levels are included in the TCSEC standard? (Multiple Choice)
Which of the following protection levels are included in the TCSEC standard? (Multiple Choice)A . Verify protection levelB . Forced protection levelC . Independent protection levelD . Passive protection levelView AnswerAnswer: ABC
Which of the following are correct about configuring the firewall security zone? (Multiple Choice)
Which of the following are correct about configuring the firewall security zone? (Multiple Choice)A . The firewall has four security zones by default, and the four security zone priorities do not support modification.B . Firewall can have 12 security zones at most.C . The firewall can create two security zones of the same priorityD ....
Which of the following options can be used in the advanced settings of windows firewall? (Multiple Choice)
Which of the following options can be used in the advanced settings of windows firewall? (Multiple Choice)A . Restore defaultsB . Change notification rulesC . Set connection security rulesD . Set out inbound rulesView AnswerAnswer: ABCD
Which of the following is not part of the LINUX operating system?
Which of the following is not part of the LINUX operating system?A . CentOSB . RedHatC . UbuntuD . MAC OSView AnswerAnswer: D
What is the nature of information security in “Implementation of security monitoring and management of information and information systems to prevent the illegal use of information and information systems”?
What is the nature of information security in “Implementation of security monitoring and management of information and information systems to prevent the illegal use of information and information systems”?A . ConfidentialityB . ControllabilityC . Non-repudiationD . IntegrityView AnswerAnswer: B
Both the GE1/0/1 and GE1/0/2 ports of the firewall belong to the DMZ. If the area connected to GE1/0/1 can access the area connected to GE1/0/2, which of the following is correct?
Both the GE1/0/1 and GE1/0/2 ports of the firewall belong to the DMZ. If the area connected to GE1/0/1 can access the area connected to GE1/0/2, which of the following is correct?A . Need to configure the security policy from Local to DMZB . No need to do any configurationC . Need to configure an interzone security policyD . Need to configure security policy from DMZ to local View...
On the USG series firewall, after the web redirection function is configured, the authentication page cannot be displayed. Which of the following is not the cause of the fault?
On the USG series firewall, after the web redirection function is configured, the authentication page cannot be displayed. Which of the following is not the cause of the fault?A . The authentication policy is not configured or the authentication policy is incorrectly configured.B . Web authentication is not enabled.C . The browser SSL version does not match the SSL version of the firewall authentication page.D...
NAPT technology can implement a public network IP address for multiple private network hosts.
NAPT technology can implement a public network IP address for multiple private network hosts.A . TrueB . FalseView AnswerAnswer: A