What are the URL matching methods in the URL filtering function in USG? (Multiple Choice)
What are the URL matching methods in the URL filtering function in USG? (Multiple Choice)A . Prefix B. Suffix C. Parameters D. to be precise E. KeywordsView AnswerAnswer: ABDE
Which of the following are the correct cutover steps?
A network needs to replace the dual-system hot-standby USG_A and USG_B due to the network upgrade of the new hardware USG. On the premise of not affecting the business, how to upgrade: USG_A is the Active device, and USG_B is the Standby device. Which of the following are the correct...
For border network security, which of the following options are recommended for planning and deployment priorities? (Multiple Choice)
For border network security, which of the following options are recommended for planning and deployment priorities? (Multiple Choice)A . Security Domain Isolation B. IPS real-time intrusion prevention C. Enable device virtualization D. Deploy a VPN E. Enable DDoS functionView AnswerAnswer: ABE
When the IPsec negotiation fails, turn on the IKE debug switch, and the following information is displayed: got NOTIFY of type INVALID_ID_INFORMATION or drop message from ABCD due to notification type INVALID_ID_INFORMATION, what does it mean?
When the IPsec negotiation fails, turn on the IKE debug switch, and the following information is displayed: got NOTIFY of type INVALID_ID_INFORMATION or drop message from ABCD due to notification type INVALID_ID_INFORMATION, what does it mean?A . The IKE proposals at both ends do not match B. IPsec proposals at...
Which of the following description about SACG certification is correct? (Multiple Choice)
Which of the following description about SACG certification is correct? (Multiple Choice)A . SACG certification is generally used for existing wired networks. B. SACG certification is generally used for new wireless networks. C. SACG is generally deployed in a bypass mode without changing the original network topology. D. SACG essentially...
What is the online certificate application method supported by firewall PKI?
What is the online certificate application method supported by firewall PKI?A . HTTP B. LDAP C. TFTP D. SCEP D. FTPView AnswerAnswer: D
If you use a mobile terminal (Android or Apple system) to access intranet resources through a web proxy, which of the following methods should be recommended?
If you use a mobile terminal (Android or Apple system) to access intranet resources through a web proxy, which of the following methods should be recommended?A . Only use web link B. Can only be rewritten using the web C. You can use web link or web rewrite D. Such...
When the dual-system hot backup network is used, according to this configuration, PC2 sends an ARP request to the Mac of IP10.100.30.8. Which of the following options is correct?
When the dual-system hot backup network is used, according to this configuration, PC2 sends an ARP request to the Mac of IP10.100.30.8. Which of the following options is correct? sysname NGFW_A # hrp enable hrp interface GigabitEthernet 0/0/3 # interface GigabitEthernet0/0/1 ip address 192.168.10.2 255.255.255.0 vrrp vrid 1 virtual-ip 192.168.10.1...
VGMP unified management of VRRP backup group status, VGMP management group Active priority is 65001, Standby priority is 65000. When the VGMP management group detects that the interface is Down through the VRRP backup group or directly, the priority of the VGMP management group is recalculated. When each interface is Down, the priority of the VGMP management group decreases by 2.
VGMP unified management of VRRP backup group status, VGMP management group Active priority is 65001, Standby priority is 65000. When the VGMP management group detects that the interface is Down through the VRRP backup group or directly, the priority of the VGMP management group is recalculated. When each interface is...
Which of the following statements about dual-system hot standby is correct? (Multiple Choice)
Which of the following statements about dual-system hot standby is correct? (Multiple Choice)A . The firewall is connected to the router upstream and connected to the Layer 2 switch downstream. OSPF+VRRP can be used to achieve load balancing. B. When link state detection is enabled, and incoming and outgoing packets...