When a corporate intranet user accesses the Internet through the USG firewall, a certain URL has been added to the blacklist, but the user can still access it. What are the possible reasons for the failure of the URL filtering function? (Multiple Choice)

When a corporate intranet user accesses the Internet through the USG firewall, a certain URL has been added to the blacklist, but the user can still access it. What are the possible reasons for the failure of the URL filtering function? (Multiple Choice)A . Not updating the list of remote...

November 24, 2022 No Comments READ MORE +

Which of the following configuration is correct?

NGFW_A and NGFW_B, NGFW_A and NGFW_C configure static routes respectively. NGFW_A -> NGFW_B is the primary link, and NGFW_A -> NGFW_C is the backup link. It is required that the traffic can be quickly switched to the backup link when the primary link fails; the traffic can be switched to...

November 23, 2022 No Comments READ MORE +

When the firewall uses the IPsec function, which protocols and ports need to be opened? (Multiple Choice)

When the firewall uses the IPsec function, which protocols and ports need to be opened? (Multiple Choice)A . The protocols are IP packets with AH and ESP. B. UDP packets with source ports 500 and 4500. C. UDP packets with destination ports 500 and 4500. D. UDP packets with destination...

November 23, 2022 No Comments READ MORE +

Which of the following functional modules can be used in conjunction with the IP-Link function? (Multiple Choice)

Which of the following functional modules can be used in conjunction with the IP-Link function? (Multiple Choice)A . DHCP B. Routing Policy C. VRRP D. OSPFView AnswerAnswer: AC

November 23, 2022 No Comments READ MORE +

Regarding the relationship between 802.1X and RADIUS, which of the following descriptions is correct?

Regarding the relationship between 802.1X and RADIUS, which of the following descriptions is correct?A . 802.1X and RADIUS are different names for the same technology. B. 802.1X is a technical system that includes RADIUS. C. 802.1X and RADIUS are different technologies, but they are often used together to complete access...

November 23, 2022 No Comments READ MORE +

In this case, which of the following descriptions is correct?

The centralized networking scheme of three servers, as shown in the figure, the administrator found that only one of the three Agile Controllers in the resource pool was alive. In this case, which of the following descriptions is correct? (Multiple Choice) A . All three database servers cannot work properly,...

November 22, 2022 No Comments READ MORE +

Which of the following aspects are included in the host reinforcement? (Multiple Choice)

Which of the following aspects are included in the host reinforcement? (Multiple Choice)A . Operating system hardening B. Database hardening C. Account password security D. Network management system reinforcement E. Vulnerability scanningView AnswerAnswer: ABC

November 22, 2022 No Comments READ MORE +

If you use a mobile terminal (Android or Apple system) to access intranet resources through a web proxy, which of the following methods should be recommended?

If you use a mobile terminal (Android or Apple system) to access intranet resources through a web proxy, which of the following methods should be recommended?A . Only use web link B. Can only be rewritten using the web C. You can use web link or web rewrite D. Such...

November 22, 2022 No Comments READ MORE +

What are the possible reasons why the local license cannot be activated? (Multiple Choice)

What are the possible reasons why the local license cannot be activated? (Multiple Choice)A . ESN mismatch B. The device cannot connect to sec.huawei.com C. The function item in the License has expired D. The device is not configured with an activation passwordView AnswerAnswer: AC

November 22, 2022 No Comments READ MORE +

The Trust zone of the USG firewall of a certain network is connected to the terminal host, and the Untrust zone is connected to the security controller. If the security controller can issue rules to the USG, which of the following security policies must be configured?

The Trust zone of the USG firewall of a certain network is connected to the terminal host, and the Untrust zone is connected to the security controller. If the security controller can issue rules to the USG, which of the following security policies must be configured?A . security-policy rule name...

November 22, 2022 No Comments READ MORE +