About AH and ESP security protocols, which of the following statements are correct? (Multiple Choice)

About AH and ESP security protocols, which of the following statements are correct? (Multiple Choice)A . AH can provide the functions of encryption and verificationB . ESP can provide the functions of encryption and verificationC . AH's protocol number is 51D . ESP's protocol number is 51View AnswerAnswer: BC

May 8, 2022 No Comments READ MORE +

Which of the following is the status information that can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)

Which of the following is the status information that can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)A . Conference tableB . ServerMap entryC . Dynamic blacklistD . Routing tableView AnswerAnswer: ABC

May 7, 2022 No Comments READ MORE +

"Caesar Password" is mainly encrypted by using a stick of specific specifications.

"Caesar Password" is mainly encrypted by using a stick of specific specifications.A . TrueB . FalseView AnswerAnswer: B

May 7, 2022 No Comments READ MORE +

What protection levels are included in TCSEC standard? (Multiple Choice)

What protection levels are included in TCSEC standard? (Multiple Choice)A . Verification ProtectionB . Forced ProtectionC . Self-protectionD . Passive ProtectionView AnswerAnswer: ABC

May 7, 2022 No Comments READ MORE +

In tunnel encapsulation mode, there is no need to have the routing to the destination private network segment, because the data will reseal using the new IP header to find routing table.

In tunnel encapsulation mode, there is no need to have the routing to the destination private network segment, because the data will reseal using the new IP header to find routing table.A . TrueB . FalseView AnswerAnswer: B

May 7, 2022 No Comments READ MORE +

Which item is correct about SSL VPN?

Which item is correct about SSL VPN?A . Can be used without the clientB . Can encrypt the IP layerC . There is a NAT crossing problemD . No authenticationView AnswerAnswer: A

May 6, 2022 No Comments READ MORE +

About the description of the Windows firewall, which of the following statements are correct? (Multiple Choice)

About the description of the Windows firewall, which of the following statements are correct? (Multiple Choice)A . Windows firewalls can only allow or prohibit preset programs or features and programs installed on the system, and cannot customize the release rules in accordance with protocols or port numbers.B . Windows firewall...

May 6, 2022 No Comments READ MORE +

On the USG series firewall, after configuring the web redirection, the the authentication page cannot pop up. Which item below does not belong to the cause?

On the USG series firewall, after configuring the web redirection, the the authentication page cannot pop up. Which item below does not belong to the cause?A . Unconfigured authentication policy or authentication policy configuration errorB . Unenable WEB authentication functionC . Browser SSL version is not matched with the firewall...

May 6, 2022 No Comments READ MORE +

Which attack below is not a malformated packet attack?

Which attack below is not a malformated packet attack?A . TEARDROP attackB . Smurf attackC . TCP shard attackD . ICMP unreachable message attackView AnswerAnswer: D

May 5, 2022 No Comments READ MORE +

When configuring NAT Server on the USG Series Firewall, a Server-Map table is generated. Which item below does not belong to content in this performance?

When configuring NAT Server on the USG Series Firewall, a Server-Map table is generated. Which item below does not belong to content in this performance?A . Destination IPB . Destination port numberC . Agreement numberD . Source IPView AnswerAnswer: D

May 5, 2022 No Comments READ MORE +