When the company network administrator configures dual-machine hot backup, configure the status of VRRP backup group 1 as Active, and configure the virtual IP address as 10.1.1.1/24, then the command that needs to be typed in the blank space is?
When the company network administrator configures dual-machine hot backup, configure the status of VRRP backup group 1 as Active, and configure the virtual IP address as 10.1.1.1/24, then the command that needs to be typed in the blank space is?A . rule name c Source-zone untrust Destination-zone trust Destination-address 202.106.1.132...
Which of the following configurations can implement the NAT ALG function?
Which of the following configurations can implement the NAT ALG function?A . nat alg protocolB . alg protocolC . nat protocolD . detect protocolView AnswerAnswer: D
In IPsec VPN transmission mode, which part of the data packet is encrypted?
In IPsec VPN transmission mode, which part of the data packet is encrypted?A . Network layer and upper layer data messagesB . Original IP headerC . New IP headerD . Transport layer and upper layer data messagesView AnswerAnswer: D
Which of the following is not a symmetric encryption algorithm?
Which of the following is not a symmetric encryption algorithm?A . IDEAB . RSAC . AESD . 3DESView AnswerAnswer: B
Which of the following is not an evidence analysis technique?
Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information stream, and analyze the correlation of time. Which of the following is not an evidence analysis technique?A . Password deciphering, data decryption technologyB . Document digital summary analysis technologyC . Techniques...
Compared with traditional five-tuple information, which of the following elements is a new element of next-generation firewall?
Compared with traditional five-tuple information, which of the following elements is a new element of next-generation firewall?A . Destination addressB . Source portC . ApplicationD . Agreement numberView AnswerAnswer: C
Which of the following statements about VPNs is false?
Which of the following statements about VPNs is false?A . Virtual private networks are less expensive than dedicated linesB . VPN technology must involve encryption technologyC . VPN technology is a technology that multiplexes logical channels on actual physical lines.D . The emergence of VPN technology allows employees on business...
Regarding the comparison between windows and linux, which of the following statements is incorrect?
Regarding the comparison between windows and linux, which of the following statements is incorrect?A . It is difficult for newbies to get started with Linux and they need some learning and guidance.B . Windows can be compatible with most software and play most games.C . Linux is open source, you...
Which of the following protocols cannot be encrypted by SSL VPN?
Which of the following protocols cannot be encrypted by SSL VPN?A . HTTPB . UDPC . IPD . PPPView AnswerAnswer: D
Regarding the anti-virus response method of the firewall gateway for the HTTP protocol, which of the following statements is incorrect?
Regarding the anti-virus response method of the firewall gateway for the HTTP protocol, which of the following statements is incorrect?A . When the gateway device blocks the HTTP connection, it pushes the web page to the client and generates logs.B . Response methods include announcement and blockingC . In the...