Regarding the description of Windows Firewall, which of the following options are correct? (Multiple Choice)

Regarding the description of Windows Firewall, which of the following options are correct? (Multiple Choice)A . Windows Firewall can only allow or prohibit preset programs or functions and programs installed on the system, and cannot customize the release rules according to the protocol or port number.B . Windows Firewall not only allows or prohibits preset programs or...

March 2, 2019 No Comments READ MORE +

Except built-in Portal authentication, firewall also supports custom Portal authentication, when using a custom Portal authentication, no need to deploy a separate external Portal server.

Except built-in Portal authentication, firewall also supports custom Portal authentication, when using a custom Portal authentication, no need to deploy a separate external Portal server.A . TrueB . FalseView AnswerAnswer: B

February 28, 2019 No Comments READ MORE +

Classify servers based on the shape, what types of the following can be divided into? (Multiple choice)

Classify servers based on the shape, what types of the following can be divided into? (Multiple choice)A . Blade serverB . Tower serverC . Rack serverD . X86 serverView AnswerAnswer: ABC

February 25, 2019 No Comments READ MORE +

Evidence identification needs to resolve the integrity verification of the evidence and determine whether it meets the applicable standards. Which of the following statements is correct about the standard of evidence identification?

Evidence identification needs to resolve the integrity verification of the evidence and determine whether it meets the applicable standards. Which of the following statements is correct about the standard of evidence identification?A . Relevance criterion means that if the electronic evidence can have a substantial impact on the facts of...

February 24, 2019 No Comments READ MORE +

Regarding the firewall security policy, which of the following options is wrong?

Regarding the firewall security policy, which of the following options is wrong?A . If the security policy is permit, the discarded message will not accumulate the number of hits.B . When configuring the security policy name, you cannot reuse the same name.C . Adjust the order of security policies with...

February 24, 2019 No Comments READ MORE +

Regarding the AH and ESP security protocols, which of the following options is correct? (Multiple Choice)

Regarding the AH and ESP security protocols, which of the following options is correct? (Multiple Choice)A . AH can provide encryption and verification functionsB . ESP can provide encryption and verification functionsC . The agreement number of AH is 51.D . The agreement number of ESP is 51.View AnswerAnswer: BC

February 13, 2019 No Comments READ MORE +

When configuring security policy, a security policy can reference an address set or configure multiple destination IP addresses.

When configuring security policy, a security policy can reference an address set or configure multiple destination IP addresses.A . TrueB . FalseView AnswerAnswer: A

February 5, 2019 No Comments READ MORE +

Under the tunnel encapsulation mode, IPSec configuration does not need to have a route to the destination private network segment, because the data will be re-encapsulated using the new IP header to find the routing table.

Under the tunnel encapsulation mode, IPSec configuration does not need to have a route to the destination private network segment, because the data will be re-encapsulated using the new IP header to find the routing table.A . TrueB . FalseView AnswerAnswer: B

February 1, 2019 No Comments READ MORE +

Some applications, such as Oracle database application, there is no data transfer for a long time, so that firewall session connection is interrupted, thus resulting in service interruption, which of the following technology can solve this problem?

Some applications, such as Oracle database application, there is no data transfer for a long time, so that firewall session connection is interrupted, thus resulting in service interruption, which of the following technology can solve this problem?A . Configure a long business connectionB . Configure default session aging timeC ....

January 22, 2019 No Comments READ MORE +

When configuring NAT Server on the USG series firewall, the server-map table will be generated. Which of the following does not belong in the table?

When configuring NAT Server on the USG series firewall, the server-map table will be generated. Which of the following does not belong in the table?A .  Destination IPB .  Destination port numberC .  Agreement numberD .  Source IPView AnswerAnswer: D

January 19, 2019 No Comments READ MORE +