1.
SSL VPN supported file sharing types can be divided into two kinds of SMB and NFS, SMB correspond Windows hosts, NFS correspond Linux host
2.
Which of the following encryption algorithm, encryption and decryption keys are the same?
3.
Policy Center system can implement two dimensions' management functions: organizational management and regional management
4.
What does ACL 2999 belong to?
5.
Some applications, such as Oracle database application, there is no data transfer for a long time, so that firewall session connection is interrupted, thus resulting in service interruption, which of the following technology can solve this problem?
6.
When Layer 2 switches (not configured VLAN) receiving a data frame, of no match is found in the MAC address table, it will forward the data frame to all ports (including Layer 2 switches receiving port).
7.
How to view the matching number of security policy?
8.
Which of the following belongs to multi-channel protocol?
9.
What problem does IPsec IKE aggressive mode mainly solve?
10.
For E1/CE1 configuration:
1, configure the virtual serial port IP address
2, configure the virtual serial port link layer protocol
3, configure E1 working mode
4, configure the timeslot bundling
The correct configuration sequence is: