Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which is incorrect about the IKE DPD statement?

A.

is used for detection of IKE neighbor status

B.

PDUs are sent periodically between B IKE PEERs.

C.

After the DPD function is enabled, the IPSec packet is not received within the interval specified by the interval, and the DPD sends a DPD request to the peer and waits for the response. Text

D.

DPD sends the query only before the encrypted message is sent and the timer expires.

71. Which option is incorrect about the HTTP Flood defense principle?

A.

HTTP Flood source authentication

B.

URI detection of destination IP

C.

fingerprint learning

D.

load check

The following scan snoop attacks are:

A.

SIP Flood attack

B.

HTTP Flood attack

C.

IP address scanning attack

D.

ICMP redirect packet attack

As shown below, the domain abc address pool is the address pool where the L2TP VPN user is located. What is wrong with the following statement?

A.

L2TP user can authenticate by domain account

B.

If the value of the used-addr-number field is smaller than the value of the Pool-length field, the number of online users does not exceed the maximum number of users.

C.

The PC behind C can obtain the IP address, but cannot dial the L2TP VPN.

D.

The address range of the D address pool is 100.0.0.2--100.0.0.99

With regard to the Radius agreement, what are the following statements correct?

A.

uses the UDP protocol to transmit Radius packets.

B.

authentication and authorization port number can be 1812

C.

Encrypt the account when transferring user accounts and passwords using the Radius protocol

D.

authentication and authorization port number can be 1645

The following figure shows the L2TP over IPSec application scenario. The client uses the pre-shared-key command to perform IPSec authentication. How should the IPSec security policy be configured on the LNS?

A.

uses IKE master mode for negotiation

B.

Negotiate in IKE aggressive mode

C.

IPSec security policy

D.

Configuring an IPSec Policy Template

The hot standby and IPSec functions are combined. Which of the following statements is correct?

A.

USG supports IPSec hot standby in active/standby mode.

B.

IPSec hot standby is not supported in load balancing mode.

C.

must configure session fast backup

D.

must be configured to preempt

Which is the correct packet encapsulation order for L2TP over IPSec?

A.

The order from the first package to the post package is PPP-->UDP-->L2TP-->IPSec

B.

The order from the first package to the back package is PPP--> L2TP-->UDP--> IPSec

C.

The order of C from pre-package to post-encapsulation is IPSec --> L2TP-->UDP--> PPP

D.

The order of D from pre-package to post-encapsulation is IPSec --> PPP --> L2TP-->UDP

The default interval for sending VGMP hello packets is 1 second. That is, when the hello packet sent by the peer is not received within the range of three hello packets, the peer is considered to be faulty. Master status.

A.

TRUE

B.

FALSE

Which of the following statements is true for virtual service technology?

A.

For multiple real servers, the real servers need to be in the same network segment and in the same security zone.

B.

For multiple real servers, the real servers may not be in the same network segment, but they must be in the same security zone.

C.

For multiple real servers, the real server may not be in the same security zone, but must be in the same network segment

D.

For multiple real servers, the network segment and security zone where the real server is located does not affect the load balancing function.