Which of the following is a method to prevent Tracert packet attacks?
Which of the following is a method to prevent Tracert packet attacks?A . Discard IP packets with time offsetB . Discard the detected ICMP messages or UDP messages that have expired, or the destination port is unreachable.C . Users can configure the maximum length of ICP packets allowed to pass...
System starts traffic statistics
System starts traffic statisticsA . 3-4-2-1B . 4-2-3-1C . 2-4-3-1D . 4-3-2-1View AnswerAnswer: A
Which of the following descriptions of the network expansion process in SSL VPN is incorrect?
Which of the following descriptions of the network expansion process in SSL VPN is incorrect?A . The remote user's local PC will automatically generate a virtual network card. The virtual gateway randomly selects an IP address from the address pool and assigns it to the remote user's virtual network card.B...
What should the administrator do to troubleshoot the issue?
A user at Ursa Major Solar is experiencing a flow error while trying to process a record to the next status. The users with the same access can process records without any errors. What should the administrator do to troubleshoot the issue?A . Use the flow debug option and set...
IPS (Intrusion Prevention System) is an application layer security device that can identify network attacks based on which of the following?
IPS (Intrusion Prevention System) is an application layer security device that can identify network attacks based on which of the following?A . Port numberB . Destination IP addressC . Feature libraryD . Source IP addressView AnswerAnswer: C
According to the provisions of the "National Cyber Security Incident Emergency Plan", when national secret information, important sensitive information and relevant educational records are lost or stolen, tampered with or counterfeited, and pose a particularly serious threat to national security and social stability Which level of emergency response should be initiated?
According to the provisions of the "National Cyber Security Incident Emergency Plan", when national secret information, important sensitive information and relevant educational records are lost or stolen, tampered with or counterfeited, and pose a particularly serious threat to national security and social stability Which level of emergency response should be...
Which of the following is a domain name attribute of LDAP?
The LDAP protocol is based on the Client/Server structure to provide binding and query of directory information. All directory information is stored on the LDAP server. In the LDAP protocol, the directory is organized according to a tree structure. The directory is composed of entries, and the entries are attribute...
Which of the following descriptions about dual-machine hot standby is incorrect?
Which of the following descriptions about dual-machine hot standby is incorrect?A . In a load-sharing network, the configuration command can be backed up from "Configure Standby Device" to "Configure Primary Device"B . In an active-standby backup network, configuration commands and status information are backed up from the active device to...
Which of the following is not an exception signature action?
If the administrator needs to set some signature actions to be different from the signature filter, you can configure exception signatures. Which of the following is not an exception signature action?A . releaseB . Block and isolate high-source IP addressesC . Block after alarm and exceeding the thresholdD . Block...
Which of the following descriptions about GRE over IPSec is incorrect?
Which of the following descriptions about GRE over IPSec is incorrect?A . The IP header added during the IPSec encapsulation process, that is, the source address is the interface address of the IPSec gateway to which the IPSec security policy is applied, and the destination address is the interface address...