Which of the following is the difference between Network Address Port Translation (NAPT) and Network Address Only Translation (No-PAT)?
Which of the following is the difference between Network Address Port Translation (NAPT) and Network Address Only Translation (No-PAT)?A . After No-PAT conversion, for external network users, all packets come from the same IP address.B . No-PAT only supports protocol port conversion at the transport layerC . NAPT only supports...
Which of the following descriptions of digital fingerprints in digital signatures is incorrect?
Which of the following descriptions of digital fingerprints in digital signatures is incorrect?A . The receiver needs to use the sender's public key to decrypt the digital signature and obtain the digital fingerprint.B . It is the data obtained by the sender after calculating the plaintext information through the HASH...
Which of the following options is not a hashing algorithm?
Which of the following options is not a hashing algorithm?A . MD5B . SHA1C . SM1D . SHA2View AnswerAnswer: C
Which of the following information is not included in the backup content of status information backup in dual-system hot backup?
Which of the following information is not included in the backup content of status information backup in dual-system hot backup?A . NAPI related entriesB . lPv4 session tableC . IPSEC tunnelD . Routing tableView AnswerAnswer: D
Which of the following attacks is not a special message attack?
Which of the following attacks is not a special message attack?A . ICMP redirect message attackB . ICMP unreachable message attackC . IP address scanning attackD . Oversized ICMP message attackView AnswerAnswer: C
The administrator connects to the firewall through the G1/0/0 interface (the interface has been added to the Trust zone). If the administrator is allowed to log in to the firewall through G1/0/0 for configuration management, how should the administrator configure the traffic allowed in the security policy? direction?
The administrator connects to the firewall through the G1/0/0 interface (the interface has been added to the Trust zone). If the administrator is allowed to log in to the firewall through G1/0/0 for configuration management, how should the administrator configure the traffic allowed in the security policy? direction?A . Allow...
Regarding the difference between packet filtering firewalls and application proxy firewalls, which of the following descriptions is incorrect?
Regarding the difference between packet filtering firewalls and application proxy firewalls, which of the following descriptions is incorrect?A . Applying proxy firewall can speed up intranet users' access to commonly used websites.B . Packet filtering firewalls are usually implemented below the transport layer, and application proxy firewalls are usually implemented...
Which of the following options belongs to Layer 2 VPN technology?
Which of the following options belongs to Layer 2 VPN technology?A . SSL VPNB . L2TP VPNC . GRE VPND . IPsec VPNView AnswerAnswer: B
When deploying dual-machine hot backup on the firewall, which of the following protocols needs to be used to achieve overall status switching of the VRRP backup group?
When deploying dual-machine hot backup on the firewall, which of the following protocols needs to be used to achieve overall status switching of the VRRP backup group?A . VRRPB . VGMPC . HRPD . OSPFView AnswerAnswer: B
Regarding SSL VPN technology, which of the following statements is incorrect?
Regarding SSL VPN technology, which of the following statements is incorrect?A . SSL VPN technology can be perfectly suitable for NAT traversal scenariosB . The encryption of SSL VPN technology only takes effect on the application layerC . SSL VPN requires a dial-up clientD . SSL VPN technology expands the...