Do the following configuration on the firewall:

Do the following configuration on the firewall: [USG-policy-security] rule name Trust Local [USG-policy-security-rule-Untrust Local] source-zone trust [USG-policy-security-rule-Untrust Local] destination-zone local [USG-policy-security-rule-Untrust Local] source-address 192.168.5.2 32 [USG-policy-security-rule-Untrust Local] destination-address 192.168.5.1 32 [USG-policy-security-rule-Untrust Local] service http [USG-policy-security-rule-Untrust Local] service telnet [USG-policy-security-rule-Untrust Local] action permit Please select the correct description below: (Multiple Choice)A...

November 17, 2022 No Comments READ MORE +

Regarding the description of NAT Server, which of the following is correct?

Regarding the description of NAT Server, which of the following is correct?A . If the public network address of the NAT Server and the corresponding public network interface address are in the same network segment, you do not need to configure black hole routing. B. If the public network address...

November 16, 2022 No Comments READ MORE +

Which authentication method is recommended to be deployed on this switch?

In a new campus network of an enterprise, under an access switch, ordinary PC users and dumb terminal users need to connect to the Internet at the same time. Which authentication method is recommended to be deployed on this switch?A . 802.1X authentication B. Portal Authentication C. MAC Authentication D....

November 16, 2022 No Comments READ MORE +

Mobile employees access the headquarters through the L2TP over IPsec tunnel. The correct statement about the planning and deployment is: (Multiple Choice)

Mobile employees access the headquarters through the L2TP over IPsec tunnel. The correct statement about the planning and deployment is: (Multiple Choice)A . The Security ACL of the headquarters USG gateway should be [USG] acl 3000 [USG-acl-adv-3000] rule permit udp source-port eq 1701 B. Since IKE V1 cannot assign addresses...

November 16, 2022 No Comments READ MORE +

Which of the following attack methods are network layer attacks? (Multiple Choice)

Which of the following attack methods are network layer attacks? (Multiple Choice)A . Constructing data packets with wrong TTL value, causing the device to handle abnormally. B. Constructing many SYN packets, leading to exhaustion of host resources. C. Construct a packet with abnormal TCP flag bit, causing the host to...

November 15, 2022 No Comments READ MORE +

Assuming that other configurations are complete and correct, what is the problem with this configuration in actual work?

The networking of a certain network is as follows: PC----ADSL router-----USG-----LAN The key configurations of the USG are as follows: l2tp enable interface Virtual-Template1 ppp authentication-mode pap ip address 4.1.1.1 255.255.255.0 remote address pool 1 l2tp-group 1 mandatory-Icp allow 12tp virtual-template 1 # user-ma page user pc1 password admin@123 aaa...

November 14, 2022 No Comments READ MORE +

168.22.122:22 <-- 192.168.22.151:4354

168.22.122:22 <-- 192.168.22.151:4354 A . Because the SSH client supports packet retransmission during the login process. B. When the PC logs in to the standby firewall FW2, the round-trip paths are inconsistent. C. The problem may be caused by turning off hrp mirror session enable. D. The problem caused by...

November 14, 2022 No Comments READ MORE +

As shown in the figure, which illustrates the negotiation process of IPsec, which of the following descriptions are correct? (Multiple Choice)

As shown in the figure, which illustrates the negotiation process of IPsec, which of the following descriptions are correct? (Multiple Choice) A . This process is the IKEv2 negotiation process. B. The red box part is the EAP authentication process. C. ①② means that the two parties negotiate the data...

November 13, 2022 No Comments READ MORE +

What functions does content filtering include in the Huawei USG firewall? (Multiple Choice)

What functions does content filtering include in the Huawei USG firewall? (Multiple Choice)A . File Content Filtering B. Apply Content Filtering C. File extension filtering D. Mail filteringView AnswerAnswer: AB

November 13, 2022 No Comments READ MORE +

The USG firewall is directly connected to other devices at Layer 3. During commissioning, it was found that the peer IP address directly connected from the firewall could not be pinged. It was confirmed that there was no problem with the peer device. What are the possible reasons? (Multiple Choice)

The USG firewall is directly connected to other devices at Layer 3. During commissioning, it was found that the peer IP address directly connected from the firewall could not be pinged. It was confirmed that there was no problem with the peer device. What are the possible reasons? (Multiple Choice)A...

November 13, 2022 No Comments READ MORE +