Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Match each of the following application layer service protocols with the correct transport layer protocols and port numbers.

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol?

A.

ESP Header

B.

TCP Header

C.

Raw IP Header

D.

ESP Tail

Which of the following statements are correct about SYN flood attack defense technologies on Huawei firewalls?

A.

The TCP connection establishment rate can be limited to defend against SYN flood attacks.

B.

The number of half-open TCP connections can be limited to defend against SYN flood attacks.

C.

SYN cookie technology can be used to defend against SYN flood attacks.

D.

Interzone security policies can be configured to defend against SYN flood attacks.

Which of the following descriptions about the heartbeat interface is wrong ( )?

A.

It is recommended to configure at least two heartbeat interfaces. - One heartbeat interface is used as the master, and the other heartbeat interface is used as the backup.

B.

The interface MTU value is greater than 1500 and cannot be used as a heartbeat interface

C.

The connection method of the heartbeat interface can be directly connected, or it can be connected through a switch or router

D.

MGMT interface (Gigabi tEtherneto/0/0) cannot be used as heartbeat interface

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver

A.

TRUE

B.

FALSE

As shown in the figure, which of the following shows the authentication range of ESP in transport mode?

A.

4

B.

1

C.

3

D.

2

The initial priority of the USG9500VGMP group is related to which of the following factors ( )? *

A.

interface bandwidth

B.

VRRP priority

C.

Number of daughter cards on the interface board

D.

The number of CPUs on the D service board

According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*

A.

Participate in information security training

B.

Backup or restore data

C.

Develop an emergency response plan

D.

Security hardening of the host

Which of the following types of packets cannot be filtered by a packet filtering firewall?

A.

Non-fragmented packets

B.

Forged ICMP error packets

C.

Initial fragments

D.

Non-initial fragments

Devices that need to provide network services externally, such as WWW servers and FTP servers, can be placed in the DMZ.

A.

TRUE

B.

FALSE