Which of the following description of the working process of network expansion is wrong?
Which of the following description of the working process of network expansion is wrong?A . After the network extension function is triggered, an SSL VPN tunnel needs to be established between the remote user and the virtual gateway.B . The local PC of the remote user will automatically generate a...
Which of the following log categories does the firewall log, content log, policy hit log, mail filtering log, URL filtering log and audit log all belong to?
Which of the following log categories does the firewall log, content log, policy hit log, mail filtering log, URL filtering log and audit log all belong to?A . Session logB . Packet Loss LogC . Business logD . System logView AnswerAnswer: C
Which statements about virtual interfaces are correct? (Multiple choice)
Which statements about virtual interfaces are correct? (Multiple choice)A . The virtual interface may cause the protocol layer DOWN because the IP address is not configured.B . The virtual interface must be added to the security zone to work.C . The virtual interface may not be configured with an IP...
In dual-system hot backup, how many cycles does the Slave consider that the peer is faulty when it does not receive the HRP HELLO message sent by the peer?
In dual-system hot backup, how many cycles does the Slave consider that the peer is faulty when it does not receive the HRP HELLO message sent by the peer?A . 1B . 2C . 3D . 5View AnswerAnswer: C
Regarding the configuration commands in the intelligent routing below, which of the following are correct? (Multiple choice)
Regarding the configuration commands in the intelligent routing below, which of the following are correct? (Multiple choice) # multi-interface mode priority-of-link-quality priority-of-link-quality parameter delay jitter loss priority-of-link-quality protocol tcp-simple add interface GigabitEthernet1/0/1 add interface GigabitEthernet1/0/2A . The bandwidth-based load sharing method is usedB . The parameters of link quality detection...
Use the web page to log in to the SSL VPN gateway, and it will automatically log out after a period of time. The possible reason is that the session of the VPN gateway has timed out.
Use the web page to log in to the SSL VPN gateway, and it will automatically log out after a period of time. The possible reason is that the session of the VPN gateway has timed out.A . TRUEB . FALSEView AnswerAnswer: A
Which of the following is not the purpose of bandwidth management?
Which of the following is not the purpose of bandwidth management?A . Limit bandwidthB . Guaranteed number of connectionsC . Limit the number of connectionsD . Guaranteed bandwidthView AnswerAnswer: B
Which of the following statement is correct?
Regarding the server load balancing technology, the commands executed on the firewall and the output obtained are as follows: Which of the following statement is correct?A . The load balancing policy enables the service health check function, and the detection packets used are TCP packets.B . The load balancing policy...
Huawei UMA products can be deployed in a logical series connection. Which of the following statements regarding the logical mode of this deployment method is correct?
Huawei UMA products can be deployed in a logical series connection. Which of the following statements regarding the logical mode of this deployment method is correct?A . Logical mode: person -> slave account -> authorization -> master account -> target system.B . Logical mode: person -> master account -> authorization...
The bandwidth management function only supports limiting the number of connections initiated by a specified IP.
The bandwidth management function only supports limiting the number of connections initiated by a specified IP.A . TRUEB . FALSEView AnswerAnswer: B