Which of the following descriptions of outbound traffic in the firewall virtual system is correct?

Which of the following descriptions of outbound traffic in the firewall virtual system is correct?A . Traffic flowing from the private network interface to the public network interface is limited by the bandwidth in the inbound direction.B . Traffic flowing from the public network interface to the private network interface...

April 13, 2024No CommentsREAD MORE +

When using an LDAP server as the authentication server, if you want to perform user authentication, which of the following operations needs to be performed on the data of the LDAP server?

When using an LDAP server as the authentication server, if you want to perform user authentication, which of the following operations needs to be performed on the data of the LDAP server?A . Query classB . Delete classC . Writing classD . Update classView AnswerAnswer: A

April 12, 2024No CommentsREAD MORE +

In the MAC address authentication scenario, the user does not need to manually enter the user name and password. Which of the following is used as the authenticated user name?

In the MAC address authentication scenario, the user does not need to manually enter the user name and password. Which of the following is used as the authenticated user name?A . Account numberB . IP addressC . Interface numberD . MAC addressView AnswerAnswer: D

April 12, 2024No CommentsREAD MORE +

WAF devices can effectively and accurately resist CC attacks. Which of the following descriptions of CC attacks is incorrect?

WAF devices can effectively and accurately resist CC attacks. Which of the following descriptions of CC attacks is incorrect?A . CC attack is a type of DDoS attackB . The attack cost of CC attacks is relatively high, and launching an attack requires a large amount of bandwidth resources.C ....

April 12, 2024No CommentsREAD MORE +

Which of the following descriptions about deploying a firewall virtual system is incorrect?

Which of the following descriptions about deploying a firewall virtual system is incorrect?A . A resource class can be bound to multiple virtual systems at the same timeB . You can view the created virtual systems and allocated resources in the "Virtual System List"C . Configure the resource class first,...

April 12, 2024No CommentsREAD MORE +

When configuring the URL template on the access device, which of the following URL parameters need to be configured?

When using iMaster NCE-Campus as the Portal server, in order to allow iMaster NCE-Campus to match the corresponding Portal page according to the user's IP address. When configuring the URL template on the access device, which of the following URL parameters need to be configured?A . ssidB . device-macC ....

April 12, 2024No CommentsREAD MORE +

Which of the following descriptions of HWTACACS protocol features is incorrect?

Which of the following descriptions of HWTACACS protocol features is incorrect?A . Use shared key encryption, but only encrypt the password field in the authentication message.B . Supports authorized use of configuration commands on the device, mostly used for device authenticationC . Based on TCP transport layer protocol, network transmission...

April 12, 2024No CommentsREAD MORE +

Which of the following is not an abnormality in the file type identification results?

Which of the following is not an abnormality in the file type identification results?A . File extension mismatchB . The file type cannot be recognizedC . File corruptionD . The file is compressedView AnswerAnswer: D

April 12, 2024No CommentsREAD MORE +

Which of the following descriptions of the RADIUS and HWTACACS protocols is incorrect?

Which of the following descriptions of the RADIUS and HWTACACS protocols is incorrect?A . All use shared keys to encrypt transmitted user informationB . Both have good flexibility and scalabilityC . The structure adopts client/server model.D . All support the authorization of configuration commands on the device.View AnswerAnswer: D

April 12, 2024No CommentsREAD MORE +