Which of the following components do consist of Policy Center system? (Choose three.)
AAnti-virus server
BSC control server
CAccess control equipment
DSM management server
In IPSEC VPN, which of the following scenarios can be applied by tunnel mode?
Abetween the host and the host
Bbetween hosts and security gateways
Cbetween security gateways
Dbetween tunnel mode and transport mode
Which of the following are included in the operating system patch violations level of Terminal security system? (Choose two.)
ALow
BImportant
CSerious
DGeneral
What does ACL 2999 belong to?
ABasic Access Control Lists
BAdvanced Access Control Lists
CAccess control list based on MAC address
DTime-based access control list
Question 6
VPN Technology
0
Question 7
Firewall Technology
Question 8
VPN Technology
Question 9
VPN Technology
Question 10
Access Control Technology
Question 11
VPN Technology
Question 12
Access Control Technology
Question 13
Security Monitoring and Management
Question 14
VPN Technology
Question 15
VPN Technology
Question 16
VPN Technology
Question 17
VPN Technology
Question 18
VPN Technology
Question 19
Firewall Technology
Question 20
Firewall Technology
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Which of the following scenarios does not support by IPSEC WEB configuration of USG6000 series firewall? (Choose two.)
AGateway to Gateway
BGateway Center
CBranch Gateway
DHost and Host
What port numbers may be used by FTP protocol? (Choose two.)
A20
B21
C23
D80
Some applications, such as Oracle database application, there is no data transfer for a long time, so that firewall session connection is interrupted, thus resulting in service interruption, which of the following technology can solve this problem?
AConfigure a long business connection
BConfigure default session aging time
COptimization of packet filtering rules
DTurn fragment cache
Which of the following option belongs to DES key length?
A56
B64
C128
D192
Terminal security access control can support? (Choose three.)
ASACG hardware (hardware security access control gateway)
B802.1X
CARP control
DSoftware SACG (host firewall)
What are the main security capability of encryption service? (Choose three.)
AConfidentiality
BIntegrity
CNon-repudiation
DScalability
When Layer 2 switches (not configured VLAN) receiving a data frame, of no match is found in the MAC address table, it will forward the data frame to all ports
(including Layer 2 switches receiving port).
ATrue
BFalse
How to view the matching number of security policy?
Adisplay current-configuration
Bdisplay policy all
Cdisplay startup saved-configuration
Ddisplay device
VPN tunnel technology refers to through encryption algorithm (such as DES, 3DE5) to achieve data transmitted in the network will not be intercepted.
ATrue
BFalse
Which VPN access modes are suitable for mobile office workers? (Choose three.)
AGRE VPN
BL2TP VPN
CSSL VPN
DL2TP over IPsec
In the GRE configuration environment, which of the following interface or IP address is the local GRE device configuration of the end private network route required to point to? (Choose two.)
ATunnel Interface
BExternal networks (Internet) Interface
CTunnel interface IP address
DExternal network (Internet) interface IP address
Which of the following belongs to multi-channel protocol?
AFTP
BTelnet
CHTTP
DSMTP
What problem does IPsec IKE aggressive mode mainly solve?
Asolve the problem of slow negotiation on both ends of the tunnel
Bsolve the security problem in the process of negotiation
Csolve NAT traversal problem
Dsolve because of uncertain originator source address cannot select pre-shared key problem
Which statement about NAT is wrong? (Choose two.)
ANAT Outbound refers to conversion to the source IP address, NAT Inbound refers to conversion to the destination IP address
BNAT Inbound command and NAT Server command have the same functions, can choose to configure according to personal preference
COutbound direction NAT can support the following application modes: one-on-one, many-to-many and many-to-one
DNAT technology can support multi-channel protocols such as FTP and other standard multi-channel protocol
When you configure a firewall between the domain security policy, if the 192.168.0.0/24 network segment is set to match object, the following configuration, which is correct? (Choose two.)