Which item is correct about SSL VPN?
Which item is correct about SSL VPN?A . Can be used without the clientB . Can encrypt the IP layerC . There is a NAT crossing problemD . No authenticationView AnswerAnswer: A
Some applications such as Oracle Database Applications, has no data streaming for a long time, so that the firewall session connection is interrupted, resulting in business interruption, which of the following is the optimal solution?
Some applications such as Oracle Database Applications, has no data streaming for a long time, so that the firewall session connection is interrupted, resulting in business interruption, which of the following is the optimal solution?A . Configure a long connection for one businessB . Open the ASPF functionC . Optimize...
In addition to supporting built-in Portal authentication, firewall also supports custom Portal authentication, and does not require separate deployment of external Portal servers when using custom Portal authentication.
In addition to supporting built-in Portal authentication, firewall also supports custom Portal authentication, and does not require separate deployment of external Portal servers when using custom Portal authentication.A . TrueB . FalseView AnswerAnswer: B
In the Client-Initiated VPN configuration, it is generally recommended to plan the address pool and headquarters network address as different network segments, otherwise you need to turn on the proxy forwarding function on the gateway device.
In the Client-Initiated VPN configuration, it is generally recommended to plan the address pool and headquarters network address as different network segments, otherwise you need to turn on the proxy forwarding function on the gateway device.A . TrueB . FalseView AnswerAnswer: B
Which of the following is a remote authentication method? (Multiple Choice)
Which of the following is a remote authentication method? (Multiple Choice)A . RADIUSB . LocalC . HWTACACSD . LLDPView AnswerAnswer: AC
When configuring a security policy, a security policy can reference the address set or configure multiple destination IP addresses.
When configuring a security policy, a security policy can reference the address set or configure multiple destination IP addresses.A . TrueB . FalseView AnswerAnswer: A
About the description of the Windows firewall, which of the following statements are correct? (Multiple Choice)
About the description of the Windows firewall, which of the following statements are correct? (Multiple Choice)A . Windows firewalls can only allow or prohibit preset programs or features and programs installed on the system, and cannot customize the release rules in accordance with protocols or port numbers.B . Windows firewall...
About SSL VPN technology, which of the following statement is wrong?
About SSL VPN technology, which of the following statement is wrong?A . SSL VPN technology is perfect for NAT traversal scenariosB . Encryption of SSL VPN technology only takes effect on the application layerC . SSL VPN requires dial clientD . SSL VPN technology expands the network range of enterprisesView...
DDoS attack belongs to which attack type?
DDoS attack belongs to which attack type?A . Snoop scan attackB . Malformed packet attackC . Special packet attackD . Flow type attackView AnswerAnswer: D
Which attack below is not a malformated packet attack?
Which attack below is not a malformated packet attack?A . TEARDROP attackB . Smurf attackC . TCP shard attackD . ICMP unreachable message attackView AnswerAnswer: D