About AH and ESP security protocols, which of the following statements are correct? (Multiple Choice)
About AH and ESP security protocols, which of the following statements are correct? (Multiple Choice)A . AH can provide the functions of encryption and verificationB . ESP can provide the functions of encryption and verificationC . AH's protocol number is 51D . ESP's protocol number is 51View AnswerAnswer: BC
Which of the following is the status information that can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)
Which of the following is the status information that can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)A . Conference tableB . ServerMap entryC . Dynamic blacklistD . Routing tableView AnswerAnswer: ABC
"Caesar Password" is mainly encrypted by using a stick of specific specifications.
"Caesar Password" is mainly encrypted by using a stick of specific specifications.A . TrueB . FalseView AnswerAnswer: B
What protection levels are included in TCSEC standard? (Multiple Choice)
What protection levels are included in TCSEC standard? (Multiple Choice)A . Verification ProtectionB . Forced ProtectionC . Self-protectionD . Passive ProtectionView AnswerAnswer: ABC
In tunnel encapsulation mode, there is no need to have the routing to the destination private network segment, because the data will reseal using the new IP header to find routing table.
In tunnel encapsulation mode, there is no need to have the routing to the destination private network segment, because the data will reseal using the new IP header to find routing table.A . TrueB . FalseView AnswerAnswer: B
Which item is correct about SSL VPN?
Which item is correct about SSL VPN?A . Can be used without the clientB . Can encrypt the IP layerC . There is a NAT crossing problemD . No authenticationView AnswerAnswer: A
About the description of the Windows firewall, which of the following statements are correct? (Multiple Choice)
About the description of the Windows firewall, which of the following statements are correct? (Multiple Choice)A . Windows firewalls can only allow or prohibit preset programs or features and programs installed on the system, and cannot customize the release rules in accordance with protocols or port numbers.B . Windows firewall...
On the USG series firewall, after configuring the web redirection, the the authentication page cannot pop up. Which item below does not belong to the cause?
On the USG series firewall, after configuring the web redirection, the the authentication page cannot pop up. Which item below does not belong to the cause?A . Unconfigured authentication policy or authentication policy configuration errorB . Unenable WEB authentication functionC . Browser SSL version is not matched with the firewall...
Which attack below is not a malformated packet attack?
Which attack below is not a malformated packet attack?A . TEARDROP attackB . Smurf attackC . TCP shard attackD . ICMP unreachable message attackView AnswerAnswer: D
When configuring NAT Server on the USG Series Firewall, a Server-Map table is generated. Which item below does not belong to content in this performance?
When configuring NAT Server on the USG Series Firewall, a Server-Map table is generated. Which item below does not belong to content in this performance?A . Destination IPB . Destination port numberC . Agreement numberD . Source IPView AnswerAnswer: D