Which of the following devices can detect unknown malicious files transmitted in the network in a virtual environment?

Which of the following devices can detect unknown malicious files transmitted in the network in a virtual environment?A . eSightB . LogCenterC . FireHunterD . WAFView AnswerAnswer: C

July 1, 2022 No Comments READ MORE +

In a dual-system hot-standby network, when configuring an HRP heartbeat interface, if the address of the peer heartbeat interface is specified, which of the following types of VGMP Hello packets are sent between firewalls?

In a dual-system hot-standby network, when configuring an HRP heartbeat interface, if the address of the peer heartbeat interface is specified, which of the following types of VGMP Hello packets are sent between firewalls?A . Unicast messageB . Broadcast messageC . Multicast messageD . UDP packetsView AnswerAnswer: A

July 1, 2022 No Comments READ MORE +

Which of the descriptions of the virtual system is incorrect?

Which of the descriptions of the virtual system is incorrect?A . There are two types of virtual systems on the NGFW: root system and virtual system.B . A special virtual system that exists by default on the NGFW is called the root system.C . The logical devices that are divided...

June 30, 2022 No Comments READ MORE +

The following figure shows the application scenario of L2TP over IPSec. The client uses the pre-shared-key method for IPSec authentication. How should the IPSec security policy be configured on the LNS side? (Multiple choice)

The following figure shows the application scenario of L2TP over IPSec. The client uses the pre-shared-key method for IPSec authentication. How should the IPSec security policy be configured on the LNS side? (Multiple choice) A . Negotiate using IKE v1 main modeB . Negotiate using IKE v2C . Configure IPSec...

June 30, 2022 No Comments READ MORE +

When using the Radius server to authenticate users, it is necessary to configure the corresponding user name and password on both the Radius server and the firewall.

When using the Radius server to authenticate users, it is necessary to configure the corresponding user name and password on both the Radius server and the firewall.A . TRUEB . FALSEView AnswerAnswer: B

June 29, 2022 No Comments READ MORE +

Which of the following statements regarding the configuration of file share paths is correct?

If using SSL VPN to provide file sharing function, all files under the shared directory are visible to end users. Which of the following statements regarding the configuration of file share paths is correct?A . The format of SMB type resource is: //IP address (hostname)/shared folder. The SMB type resource...

June 29, 2022 No Comments READ MORE +

When configuring the IPSec VPN certificate authentication method, if you choose the "RSA signature" authentication method, which of the following steps need to be configured? (Multiple choice)

When configuring the IPSec VPN certificate authentication method, if you choose the "RSA signature" authentication method, which of the following steps need to be configured? (Multiple choice)A . Upload the CA certificateB . Upload the local certificateC . Upload the peer device certificateD . Create a public-private key pair for...

June 29, 2022 No Comments READ MORE +

After completing the configuration of intelligent routing, it is found that the traffic is not forwarded according to the configuration. What measures can the administrator take? (Multiple choices)

After completing the configuration of intelligent routing, it is found that the traffic is not forwarded according to the configuration. What measures can the administrator take? (Multiple choices)A . Reconfigure the intelligent routing strategyB . Wait for the session table to ageC . Manually clear session table information through the...

June 28, 2022 No Comments READ MORE +

Which of the following information is included in the main mode negotiation process in the first phase of IKE v1 negotiation? (Multiple choice)

Which of the following information is included in the main mode negotiation process in the first phase of IKE v1 negotiation? (Multiple choice)A . IKE Proposal SetB . IPSec Proposal SetC . DH key exchange public informationD . Identity information of both partiesView AnswerAnswer: ACD

June 27, 2022 No Comments READ MORE +

In the IDC room, a Huawei USG6000 series firewall can be used to divide into several virtual systems, and then the root firewall administrator can generate virtual system administrators to manage each virtual system.

In the IDC room, a Huawei USG6000 series firewall can be used to divide into several virtual systems, and then the root firewall administrator can generate virtual system administrators to manage each virtual system.A . TRUEB . FALSEView AnswerAnswer: A

June 27, 2022 No Comments READ MORE +