Which of the following statements is correct?

Figure shows the data flow direction of power bypass interface in the Bypass working mode and non-bypass working mode, on the working process of power bypass interface. Which of the following statements is correct? (Choose 2 Answers) A. When the interface operates in the non-bypass state, traffic flows from the...

December 24, 2018 No Comments READ MORE +

In the solution of Huawei abnormal flow cleaning, in the scene of bypass deployment, which drainage program can be used? (Choose 3 Answers)

In the solution of Huawei abnormal flow cleaning, in the scene of bypass deployment, which drainage program can be used? (Choose 3 Answers)A . Dynamic routing drainageB . Static policy routing drainageC . Static routing drainageD . MPLS VPNView AnswerAnswer: ABC

December 22, 2018 No Comments READ MORE +

According to the above information, which of the following statement is correct?

When the user's SSL VPN has been authenticated successfully, the user can not access the Web-link resource, view the information through the Web server as follows: According to the above information, which of the following statement is correct?A . Intranet server does not open Web serviceB . Virtual gateway policy...

November 16, 2018 No Comments READ MORE +

In an Eth-Trunk interface, traffic load balancing can be achieved by configuring different weights on each member link.

In an Eth-Trunk interface, traffic load balancing can be achieved by configuring different weights on each member link.A . TRUEB . FALSEView AnswerAnswer: A

October 20, 2018 No Comments READ MORE +

DHCP snooping function needs to maintain the binding table, what contents of the binding table are included? (Select 3 Answers)

DHCP snooping function needs to maintain the binding table, what contents of the binding table are included? (Select 3 Answers)A . MACB . VlanC . InterfaceD . DHCP Server 的 IPView AnswerAnswer: ABC

September 23, 2018 No Comments READ MORE +

What is the correct statement about IPsec and IKE? (Choose 3 Answers)

What is the correct statement about IPsec and IKE? (Choose 3 Answers)A . IPsec has two ways to establish an alliance, one is manual, one is IKE auto-negotiation (isakmp).B . IKE aggressive mode can choose to negotiate the IP address or ID of the initiator to check the find the...

September 22, 2018 No Comments READ MORE +

The following descriptions are about the packet 1 and the packet 2 fields, which is correct?

Man-in-the-middle attack means that the middleman completes the data exchange between the server and the client. In the server's view, all the messages are from or sent to the client; in the client's view, all the messages are also from or sent to the server side. If a hacker uses...

August 19, 2018 No Comments READ MORE +

PC establish l2tp vpn through the vpn client and USG (LNS), what are possible reasons of dial-up failure?

One network is shown as below: PC establish l2tp vpn through the vpn client and USG (LNS), what are possible reasons of dial-up failure? (Select 3 Answers)A . The tunnel name of the LNS is not consistent with the client's.B . L2TP tunnel authentication failed.C . PPP authentication fails, the...

August 13, 2018 No Comments READ MORE +

According to the daul hot standby network diagram, the following are the descriptions about the daul hot standby preemption function, which are correct? (Select 3 Answers)

According to the daul hot standby network diagram, the following are the descriptions about the daul hot standby preemption function, which are correct? (Select 3 Answers) A . VRRP backup group itself has preemption function. In the figure, when USG_A fails and is restored, USG_A will use the preemption function...

August 8, 2018 No Comments READ MORE +

On the TCP proxy and TCP reverse source detection, which statement is correct? (Select 3 Answers)

On the TCP proxy and TCP reverse source detection, which statement is correct? (Select 3 Answers)A . Both TCP proxy and TCP reverse source detection can prevent SYN Flood.B . The principle of TCP agent is that the device acts as a proxy between the two ends of the TP...

August 1, 2018 No Comments READ MORE +