1.
The main method of caching servers DNS Request Flood defense is the use of DNS source authentication.
2.
Regarding IKE main mode and aggressive modes, which of the following statements is correct?
3.
A user has been successfully authenticated using an SSL VPN. However, users can not access the Web-link resources through the Web server.
Using the information provided, which of the following is correct?
4.
Through the configuration of the Bypass interface, you can avoid network communication interruption caused by equipment failure and improve reliability. The power Bypass function can use any network interfaces to configure the Bypass GE parameters to achieve the Bypass function.
5.
In the attack shown below, a victim host packet captures the traffic. According to the information shown, what kind of attack is this?
6.
In IPsec VPN with NAT traversal, you must use IKE aggressive mode.
7.
In an Eth-Trunk interface, you can achieve load balancing by configuring different weights on each member link.
8.
A SSL VPN login authentication is unsuccessful, and the prompt says "wrong user name or password." What is wrong?
9.
SSL works at the application layer and is encrypted for specific applications, while IPsec operates at which layer and provides transparent encryption protection for this level and above?
10.
Dual hot standby load balancing service requires three interfaces, one for the line connecting the router, and two USG facilities mutual backup, configuration commands are "hrp track master" and "hrp track slave"