In the attack, the packet captured by one victim host is shown as the following screenshot, according to the analysis, what the acctack is?

In the attack, the packet captured by one victim host is shown as the following screenshot, according to the analysis, what the acctack is? A . SYN FloodB . SYN-ACK FloodC . ACK-FloodD . Connection FloodView AnswerAnswer: C

July 4, 2018 No Comments READ MORE +

In the case of the IPsec VPN doing the NAT across, it must use the IKE aggressive mode.

In the case of the IPsec VPN doing the NAT across, it must use the IKE aggressive mode.A . TRUEB . FALSEView AnswerAnswer: B

June 28, 2018 No Comments READ MORE +

By configuring the Bypass interface can avoid the network interruption caused by device failure and improve the reliability of the network. Power Bypass function can use any GE interface to achieve the Bypass function by configuring the Bypass relative parameters.

By configuring the Bypass interface can avoid the network interruption caused by device failure and improve the reliability of the network. Power Bypass function can use any GE interface to achieve the Bypass function by configuring the Bypass relative parameters.A . TRUEB . FALSEView AnswerAnswer: B

June 24, 2018 No Comments READ MORE +

Access to the headquarters server from the branch computer through the IPsec VPN, at this moment, the IPSEC tunnel can be established normally but business is blocked up, what are the possible reasons? (Select 3 Answers)

Access to the headquarters server from the branch computer through the IPsec VPN, at this moment, the IPSEC tunnel can be established normally but business is blocked up, what are the possible reasons? (Select 3 Answers)A . The packet is fragmented and the fragmented packet is discarded on the link.B...

June 20, 2018 No Comments READ MORE +

About the IKE Master Mode and Aggressive Mode, which of the following statement is correct?

About the IKE Master Mode and Aggressive Mode, which of the following statement is correct?A . All the negotiation packets in the first stage of the aggressive mode are encryptedB . All the negotiation packets in the first phase of the master mode are encryptedC . The aggressive mode uses...

May 29, 2018 No Comments READ MORE +

The main method of Defense cache server DNS Request Flood is to use the DNS source authentication.

The main method of Defense cache server DNS Request Flood is to use the DNS source authentication.A . TRUEB . FALSEView AnswerAnswer: A

May 9, 2018 No Comments READ MORE +

In dual hot standby, the backup channel must be the main interface on the interface board, which type does not support?

In dual hot standby, the backup channel must be the main interface on the interface board, which type does not support?A . EthernetB . GigabitEthernetC . E1D . vlan-ifView AnswerAnswer: C

March 30, 2018 No Comments READ MORE +

SSL VPN authentication landing is not successful, and prompted "wrong user name or password", which option is wrong?

SSL VPN authentication landing is not successful, and prompted "wrong user name or password", which option is wrong?A . User name and password input error.B . User or group filter field configuration error.C . The certificate filter field is incorrectly configured.D . The administrator configured a policy that limits the...

March 18, 2018 No Comments READ MORE +