What algorithm can session persistence be based on?

What algorithm can session persistence be based on?A . Least Connection algorithmB . Source IP hash algorithmC . Simple polling algorithmD . Weighted Round Robin algorithmView AnswerAnswer: B

June 23, 2022 No Comments READ MORE +

Global route selection means that when there are multiple equal-cost routes to the destination network, the Huawei USG6000 firewall can dynamically select the outgoing interface according to the link bandwidth, weight, priority set by the administrator or the automatically detected link quality to realize the reasonable utilization of link resources and improvement of user experience.

Global route selection means that when there are multiple equal-cost routes to the destination network, the Huawei USG6000 firewall can dynamically select the outgoing interface according to the link bandwidth, weight, priority set by the administrator or the automatically detected link quality to realize the reasonable utilization of link resources...

June 23, 2022 No Comments READ MORE +

Regarding server load balancing, which of the following technologies can be used to sense changes in server status and ensure that user requests will not be sent to faulty servers?

Regarding server load balancing, which of the following technologies can be used to sense changes in server status and ensure that user requests will not be sent to faulty servers?A . VGMP Hello messageB . VRRP packetsC . DPDD . Service Health CheckView AnswerAnswer: D

June 23, 2022 No Comments READ MORE +

IP-Link will send a detection packet to the specified IP address. By default, when the detection fails for 3 times, the link to this IP address is considered to be faulty.

IP-Link will send a detection packet to the specified IP address. By default, when the detection fails for 3 times, the link to this IP address is considered to be faulty.A . TRUEB . FALSEView AnswerAnswer: A

June 23, 2022 No Comments READ MORE +

Users cannot access intranet resources when using the network extension function. Which of the following is not the possible cause of the failure?

Users cannot access intranet resources when using the network extension function. Which of the following is not the possible cause of the failure?A . Has a virtual IP address been obtained on the virtual network card of the user PC?B . The route between the firewall and the intranet server...

June 23, 2022 No Comments READ MORE +

As shown in the figure, the firewall dual-system hot-standby networking environment. In this networking environment, which of the following commands can ensure that the device can automatically adjust the priority of the VGMP management group and automatically perform the active-standby switchover?

As shown in the figure, the firewall dual-system hot-standby networking environment. In this networking environment, which of the following commands can ensure that the device can automatically adjust the priority of the VGMP management group and automatically perform the active-standby switchover? A . hrp ospf-cost adjust-enableB . hrp preempt delay...

June 21, 2022 No Comments READ MORE +

To ensure that traffic transmission is not affected by server or link failures, the administrator has configured the health check of the link, but after the configuration is completed, it is found that the status of the health check is still Down. What are the possible reasons? (Multiple choice)

To ensure that traffic transmission is not affected by server or link failures, the administrator has configured the health check of the link, but after the configuration is completed, it is found that the status of the health check is still Down. What are the possible reasons? (Multiple choice)A ....

June 21, 2022 No Comments READ MORE +

The two FWs are interconnected through IPSec. Execute display ike sa on FW_A. The result is as follows. Which of the following statements is correct? (Multiple choice)

The two FWs are interconnected through IPSec. Execute display ike sa on FW_A. The result is as follows. Which of the following statements is correct? (Multiple choice) A. FW_A is the initiator of IKE secure channel negotiation B. FW_B is the initiator of IKE secure channel negotiation C. SA between...

June 21, 2022 No Comments READ MORE +

Which of the following statements about this configuration is true?

As shown in the figure, BFD is bound to a static route, and the administrator has made the following configuration on firewall A: [USG6000_A] bfd [USG6000_A-bfd] quit [USG6000_A] bfd as bind peer-ip 1.1.1.2 [USG6000_A-bfd-session-aa] discriminator local 10 [USG6000_A-bfd-session-aa] discriminator remote 20 [USG6000_A-bfd-session-aa] commit [USG6000_A-bfd-session-aa] quit Which of the following statements...

June 20, 2022 No Comments READ MORE +

Which of the following is the possible cause of the failure?

Which of the following is the possible cause of the failure?A . The route between the gateway and the intranet server is unreachable.B . The user is not assigned to the resources of the web proxy.C . The security policy does not allow traffic from the extranet to the intranet...

June 20, 2022 No Comments READ MORE +