Which of the following descriptions are correct?
168.1.2:44012[1.1.1.3:6103] --> 2.2.2.2:2048 Which of the following descriptions are correct? (Multiple Choice)A . The device with the address 192.160.1.2 is pinging the public network address 2.2.2.2. B. The device with the address 1.1.1.3 is performing a ping test on the public network address 2.2.2.2. C. NAT destination address one-to-one address...
When the network traffic is heavy, if you do not want the downstream network to be congested or directly discard many packets due to the excessive data traffic sent upstream, you can limit and cache the traffic on the outbound interface of the upstream device, so that such packets can be blocked. The text is sent out at a relatively uniform speed.
When the network traffic is heavy, if you do not want the downstream network to be congested or directly discard many packets due to the excessive data traffic sent upstream, you can limit and cache the traffic on the outbound interface of the upstream device, so that such packets can...
In NGFW, to use the RBL blacklist, which of the following key options need to be configured by the network administrator? (Multiple Choice)
In NGFW, to use the RBL blacklist, which of the following key options need to be configured by the network administrator? (Multiple Choice)A . DNS server B. Response code C. RBL server IP address D. SMTP server IP addressView AnswerAnswer: AB
Which of the following descriptions is incorrect?
168.100.28:1036 [58.251.159.112:2048] --> 111.206.79.100:80 Which of the following descriptions is incorrect?A . The firewall interface GigabitEthernet0/0/1 belongs to the untrust zone. B. The MAC address of the outgoing interface of the firewall is 00-0f-e2-a2-a2-61. C. The internal network 192.168.100.28 host establishes an http connection with the external network 111.206.79.100. D....
Which of the following configuration is correct?
NGFW_A and NGFW_B, NGFW_A and NGFW_C configure static routes respectively. NGFW_A -> NGFW_B is the primary link, and NGFW_A -> NGFW_C is the backup link. It is required that the traffic can be quickly switched to the backup link when the primary link fails; the traffic can be switched to...
The intranet IP address of a Web Server deployed in the DMZ area of an enterprise is 10.1.1.3, the port is 8080, the public network address announced to the outside world is 1.1.1.2, and the external port number is 80.
The intranet IP address of a Web Server deployed in the DMZ area of an enterprise is 10.1.1.3, the port is 8080, the public network address announced to the outside world is 1.1.1.2, and the external port number is 80. Configure the following commands on the firewall: [USG6600] security-policy [[USG6600-policy-security]...
Which specific drainage technology is generally required to achieve automatic drainage?
In the abnormal flow cleaning scheme, automatic drainage means that the detection equipment reports abnormal flow to the management center, and the management center automatically generates drainage tasks and automatically sends drainage tasks to the cleaning equipment. Which specific drainage technology is generally required to achieve automatic drainage?A . BGP...
Which of the following descriptions are correct?
The firewall is deployed between the mobile terminal of the wireless user and the WAP gateway, the mobile terminal is in the trust zone, and the WAP gateway is in the untrust zone, and the following configurations are made: [USG] ad 3000 [USG-acl-adv-3000] rule permit ip destination 202.10.10.2 0 [USG-acl-adv-3000]...
Using the SSL function of the USG gateway, the administrator can quickly and securely access all resources in the enterprise intranet, not only Web resources, but also ensure that the communication between the client and the virtual gateway adopts the SSL security protocol, and must ensure that the SSL client does not affect access to other network resources and can directly access Internet resources _______________.
Using the SSL function of the USG gateway, the administrator can quickly and securely access all resources in the enterprise intranet, not only Web resources, but also ensure that the communication between the client and the virtual gateway adopts the SSL security protocol, and must ensure that the SSL client...
The IPsecVPN tunnel is successfully established, but the speed of accessing the peer's private network web page is slow or the access is intermittent. The influence of the Internet network quality has been eliminated. The following possible faults are: (Multiple Choice)
The IPsecVPN tunnel is successfully established, but the speed of accessing the peer's private network web page is slow or the access is intermittent. The influence of the Internet network quality has been eliminated. The following possible faults are: (Multiple Choice)A . The problem of packet fragmentation B. The CPU...