Which of the following plans are reasonable?
An enterprise has the following requirements: The intranet users in the Trust zone are on the 192.168.1.0/24 network segment and can access the Internet. There are a total of 50 hosts (192.168.1.1-192.168.1.50) with a total curtain size of 500M. Which of the following plans are reasonable?A . The overall bandwidth...
Which of the following options can be used as a condition for Portal push? (Multiple Choice)
Which of the following options can be used as a condition for Portal push? (Multiple Choice)A . Terminal IP address range B. Terminal browser type C. Terminal Equipment Type D. SSID of the access AP E. The MAC address of the access AP F. MAC address of the access ACView...
Regarding the way SAC equipment accesses the network, which of the following descriptions are correct? (Multiple Choice)
Regarding the way SAC equipment accesses the network, which of the following descriptions are correct? (Multiple Choice)A . SACG equipment is required to communicate with the terminal at Layer 2. B. The SACG is usually side-mounted on the core switch device and uses policy routing to divert traffic. C. SACG...
What are the possible reasons why the local license cannot be activated? (Multiple Choice)
What are the possible reasons why the local license cannot be activated? (Multiple Choice)A . ESN mismatch B. The device cannot connect to sec.huawei.com C. The function item in the License has expired D. The device is not configured with an activation passwordView AnswerAnswer: AC
If the content of the visited web page contains filtered content, what will be the result?
If the content of the visited web page contains filtered content, what will be the result?A . Display "Cannot open webpage" B. Display "The web page has been filtered". C. The filtered content is deleted and will not be displayed. D. The filter content is replaced with “*”.View AnswerAnswer: A
When using the SSL VPN network extension function, the virtual IP address pool can be set to the same network segment as the IP address of the internal network interface of the device.
When using the SSL VPN network extension function, the virtual IP address pool can be set to the same network segment as the IP address of the internal network interface of the device. If the virtual IP address pool and the IP address of the internal network interface are not...
Which statement about MTU and PMTU is correct? (Multiple Choice)
Which statement about MTU and PMTU is correct? (Multiple Choice)A . MTU (Maximum Transfer Unit) refers to the size of the largest data packet that can be transmitted in the network, in bytes. B. The device will check the MTU on the inbound interface, and if the packet size exceeds...
The whitelist + blacklist mode is adopted in terminal security management. Which of the following are normal behaviors?
The whitelist + blacklist mode is adopted in terminal security management. Which of the following are normal behaviors?A . The terminal host does not have the software in the whitelist installed, nor the software in the blacklist. B. The terminal host installs all the software in the white list, but...
The correct statement about UDP Flood and TCP Flood attack prevention is: (Multiple Choice)
The correct statement about UDP Flood and TCP Flood attack prevention is: (Multiple Choice)A . The UDP protocol is connectionless, so it cannot be implemented by source detection. B. Prevent UDP Flood by analyzing the rules and characteristics of UDP packets sent by a certain host, the rules and characteristics...
Which of the following configuration is correct?
NGFW_A and NGFW_B, NGFW_A and NGFW_C configure static routes respectively. NGFW_A -> NGFW_B is the primary link, and NGFW_A -> NGFW_C is the backup link. It is required that the traffic can be quickly switched to the backup link when the primary link fails; the traffic can be switched to...