When the company network administrator configures dual-machine hot backup, configure the status of VRRP backup group 1 as Active, and configure the virtual IP address as 10.1.1.1/24, then the command that needs to be typed in the blank space is?

When the company network administrator configures dual-machine hot backup, configure the status of VRRP backup group 1 as Active, and configure the virtual IP address as 10.1.1.1/24, then the command that needs to be typed in the blank space is?A . rule name c Source-zone untrust Destination-zone trust Destination-address 202.106.1.132...

November 16, 2023 No Comments READ MORE +

Which of the following configurations can implement the NAT ALG function?

Which of the following configurations can implement the NAT ALG function?A . nat alg protocolB . alg protocolC . nat protocolD . detect protocolView AnswerAnswer: D

November 16, 2023 No Comments READ MORE +

In IPsec VPN transmission mode, which part of the data packet is encrypted?

In IPsec VPN transmission mode, which part of the data packet is encrypted?A . Network layer and upper layer data messagesB . Original IP headerC . New IP headerD . Transport layer and upper layer data messagesView AnswerAnswer: D

November 15, 2023 No Comments READ MORE +

Which of the following is not a symmetric encryption algorithm?

Which of the following is not a symmetric encryption algorithm?A . IDEAB . RSAC . AESD . 3DESView AnswerAnswer: B

November 15, 2023 No Comments READ MORE +

Which of the following is not an evidence analysis technique?

Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information stream, and analyze the correlation of time. Which of the following is not an evidence analysis technique?A . Password deciphering, data decryption technologyB . Document digital summary analysis technologyC . Techniques...

November 15, 2023 No Comments READ MORE +

Compared with traditional five-tuple information, which of the following elements is a new element of next-generation firewall?

Compared with traditional five-tuple information, which of the following elements is a new element of next-generation firewall?A . Destination addressB . Source portC . ApplicationD . Agreement numberView AnswerAnswer: C

November 15, 2023 No Comments READ MORE +

Which of the following statements about VPNs is false?

Which of the following statements about VPNs is false?A . Virtual private networks are less expensive than dedicated linesB . VPN technology must involve encryption technologyC . VPN technology is a technology that multiplexes logical channels on actual physical lines.D . The emergence of VPN technology allows employees on business...

November 15, 2023 No Comments READ MORE +

Regarding the comparison between windows and linux, which of the following statements is incorrect?

Regarding the comparison between windows and linux, which of the following statements is incorrect?A . It is difficult for newbies to get started with Linux and they need some learning and guidance.B . Windows can be compatible with most software and play most games.C . Linux is open source, you...

November 14, 2023 No Comments READ MORE +

Which of the following protocols cannot be encrypted by SSL VPN?

Which of the following protocols cannot be encrypted by SSL VPN?A . HTTPB . UDPC . IPD . PPPView AnswerAnswer: D

November 14, 2023 No Comments READ MORE +

Regarding the anti-virus response method of the firewall gateway for the HTTP protocol, which of the following statements is incorrect?

Regarding the anti-virus response method of the firewall gateway for the HTTP protocol, which of the following statements is incorrect?A . When the gateway device blocks the HTTP connection, it pushes the web page to the client and generates logs.B . Response methods include announcement and blockingC . In the...

November 14, 2023 No Comments READ MORE +