Figure shows the data flow direction of power bypass interface in the Bypass working mode and non-bypass working mode, on the working process of power bypass interface. Which of the following statements is correct? (Choose 2 Answers) A. When the interface operates in the non-bypass state, traffic flows from the GE0 interface to the...Continue reading
In the solution of Huawei abnormal flow cleaning, in the scene of bypass deployment, which drainage program can be used? (Choose 3 Answers)A . Dynamic routing drainageB . Static policy routing drainageC . Static routing drainageD . MPLS VPN View Answer Answer: ABC...
When the user’s SSL VPN has been authenticated successfully, the user can not access the Web-link resource, view the information through the Web server as follows: According to the above information, which of the following statement is correct?A . Intranet server does not open Web serviceB . Virtual gateway policy configuration errorC . The...Continue reading
In an Eth-Trunk interface, traffic load balancing can be achieved by configuring different weights on each member link.A . TRUEB . FALSE View Answer Answer: A...
DHCP snooping function needs to maintain the binding table, what contents of the binding table are included? (Select 3 Answers)A . MACB . VlanC . InterfaceD . DHCP Server 的 IP View Answer Answer: ABC...
What is the correct statement about IPsec and IKE? (Choose 3 Answers)A . IPsec has two ways to establish an alliance, one is manual, one is IKE auto-negotiation (isakmp).B . IKE aggressive mode can choose to negotiate the IP address or ID of the initiator to check the find the corresponding authentication and complete...Continue reading
Man-in-the-middle attack means that the middleman completes the data exchange between the server and the client. In the server’s view, all the messages are from or sent to the client; in the client’s view, all the messages are also from or sent to the server side. If a hacker uses a man-in-the-middle attack, the...Continue reading
One network is shown as below: PC establish l2tp vpn through the vpn client and USG (LNS), what are possible reasons of dial-up failure? (Select 3 Answers)A . The tunnel name of the LNS is not consistent with the client’s.B . L2TP tunnel authentication failed.C . PPP authentication fails, the PPP authentication mode set...Continue reading
According to the daul hot standby network diagram, the following are the descriptions about the daul hot standby preemption function, which are correct? (Select 3 Answers) A . VRRP backup group itself has preemption function. In the figure, when USG_A fails and is restored, USG_A will use the preemption function to back into master...Continue reading
On the TCP proxy and TCP reverse source detection, which statement is correct? (Select 3 Answers)A . Both TCP proxy and TCP reverse source detection can prevent SYN Flood.B . The principle of TCP agent is that the device acts as a proxy between the two ends of the TP connection, when one of...Continue reading