Which of the following descriptions of outbound traffic in the firewall virtual system is correct?
Which of the following descriptions of outbound traffic in the firewall virtual system is correct?A . Traffic flowing from the private network interface to the public network interface is limited by the bandwidth in the inbound direction.B . Traffic flowing from the public network interface to the private network interface...
When using an LDAP server as the authentication server, if you want to perform user authentication, which of the following operations needs to be performed on the data of the LDAP server?
When using an LDAP server as the authentication server, if you want to perform user authentication, which of the following operations needs to be performed on the data of the LDAP server?A . Query classB . Delete classC . Writing classD . Update classView AnswerAnswer: A
In the MAC address authentication scenario, the user does not need to manually enter the user name and password. Which of the following is used as the authenticated user name?
In the MAC address authentication scenario, the user does not need to manually enter the user name and password. Which of the following is used as the authenticated user name?A . Account numberB . IP addressC . Interface numberD . MAC addressView AnswerAnswer: D
WAF devices can effectively and accurately resist CC attacks. Which of the following descriptions of CC attacks is incorrect?
WAF devices can effectively and accurately resist CC attacks. Which of the following descriptions of CC attacks is incorrect?A . CC attack is a type of DDoS attackB . The attack cost of CC attacks is relatively high, and launching an attack requires a large amount of bandwidth resources.C ....
Which of the following descriptions about deploying a firewall virtual system is incorrect?
Which of the following descriptions about deploying a firewall virtual system is incorrect?A . A resource class can be bound to multiple virtual systems at the same timeB . You can view the created virtual systems and allocated resources in the "Virtual System List"C . Configure the resource class first,...
When configuring the URL template on the access device, which of the following URL parameters need to be configured?
When using iMaster NCE-Campus as the Portal server, in order to allow iMaster NCE-Campus to match the corresponding Portal page according to the user's IP address. When configuring the URL template on the access device, which of the following URL parameters need to be configured?A . ssidB . device-macC ....
Which of the following descriptions of HWTACACS protocol features is incorrect?
Which of the following descriptions of HWTACACS protocol features is incorrect?A . Use shared key encryption, but only encrypt the password field in the authentication message.B . Supports authorized use of configuration commands on the device, mostly used for device authenticationC . Based on TCP transport layer protocol, network transmission...
A user uses SSL to access network resources on the intranet. The administrator has enabled file sharing and web proxy services for the user, and has allowed the traffic of the service on the firewall. However, after the user enters the address of the virtual gateway on the PC, the web page fails. I cannot see the list of file shares and web proxies. Which of the following options may cause this failure?
A user uses SSL to access network resources on the intranet. The administrator has enabled file sharing and web proxy services for the user, and has allowed the traffic of the service on the firewall. However, after the user enters the address of the virtual gateway on the PC, the...
Which of the following is not an abnormality in the file type identification results?
Which of the following is not an abnormality in the file type identification results?A . File extension mismatchB . The file type cannot be recognizedC . File corruptionD . The file is compressedView AnswerAnswer: D
Which of the following descriptions of the RADIUS and HWTACACS protocols is incorrect?
Which of the following descriptions of the RADIUS and HWTACACS protocols is incorrect?A . All use shared keys to encrypt transmitted user informationB . Both have good flexibility and scalabilityC . The structure adopts client/server model.D . All support the authorization of configuration commands on the device.View AnswerAnswer: D