Common Vulnerability Scoring System (CVSS) is a widely used open standard for vulnerability scoring and adopts a modular scoring system. Which of the following does not include?

Common Vulnerability Scoring System (CVSS) is a widely used open standard for vulnerability scoring and adopts a modular scoring system. Which of the following does not include?A . Environmental dimensionB . Time dimensionC . Basic dimensionsD . Spatial dimensionsView AnswerAnswer: D

April 10, 2024No CommentsREAD MORE +

Which of the following descriptions of BFD detection characteristics is incorrect?

Which of the following descriptions of BFD detection characteristics is incorrect?A . Reduce application interruption time and improve network reliabilityB . Establish a session between the two devices to monitor the bidirectional forwarding pathC . Provide a detection time of less than 1 second to speed up network convergenceD ....

April 10, 2024No CommentsREAD MORE +

Which of the following is a resource that can be defined in a bandwidth channel?

Bandwidth channels define specific bandwidth resources and are the basis for bandwidth management. Which of the following is a resource that can be defined in a bandwidth channel?A . Bandwidth policyB . Daily traffic quotaC . Egress bandwidth restrictionsD . Strategic exclusivityView AnswerAnswer: D

April 10, 2024No CommentsREAD MORE +

What should the administrator do to troubleshoot the issue?

A user at Ursa Major Solar is experiencing a flow error while trying to process a record to the next status. The users with the same access can process records without any errors. What should the administrator do to troubleshoot the issue?A . Use the flow debug option and set...

April 10, 2024No CommentsREAD MORE +

Which item does the authentication protocol of Portal authentication not include?

Which item does the authentication protocol of Portal authentication not include?A . EAP protocolB . HTTP protocolC . Portal protocolD . HTTPS protocolView AnswerAnswer: A

April 9, 2024No CommentsREAD MORE +

Regarding the weight value and the behavior of users accessing web pages, which of the following statements is correct?

The administrator has defined two keywords that need to be identified on the firewall. The keyword administrator has defined two keywords that need to be identified on the firewall. The weight value of keyword X is 2 and the weight value of keyword Y is 3. The alarm threshold for...

April 9, 2024No CommentsREAD MORE +

When using an LDAP server as the authentication server, which of the following protocols is used for the interaction between the device and the server?

When using an LDAP server as the authentication server, which of the following protocols is used for the interaction between the device and the server?A . RADIUS protocolB . HTTP protocolC . LDAP protocolD . EAP protocolView AnswerAnswer: C

April 9, 2024No CommentsREAD MORE +

Which of the following parameters is not a condition for global routing policy classification?

Which of the following parameters is not a condition for global routing policy classification?A . BandwidthB . Port numberC . QualityD . WeightView AnswerAnswer: B

April 9, 2024No CommentsREAD MORE +

WAF device’s working mode does not include which of the following?

WAF device’s working mode does not include which of the following?A . Forward proxyB . Reverse proxyC . Bridge modeD . Transparent proxyView AnswerAnswer: A

April 9, 2024No CommentsREAD MORE +

Which of the following descriptions of policy routing execution actions is incorrect?

Which of the following descriptions of policy routing execution actions is incorrect?A . Unable to forward traffic to other virtual systems according to policy routingB . Policy routing is not required and forwarding is performed according to the existing routing table.C . Use the intelligent routing function to select one...

April 9, 2024No CommentsREAD MORE +