Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is not a process for remote users to access intranet resources through SSL VPN?

A.

Resource access

B.

User authentication

C.

Access accounting

D.

User login

When Eth-Trunk is deployed for the heartbeat links between firewalls, the Eth-Trunk interface can be configured as a Layer 2 interface as long as the total bandwidth of active links on the Eth-Trunk is greater than 30% of the bandwidth required by service traffic.

A.

TRUE

B.

FALSE

: 51 DRAG DROP

Match the description about virtual systems and VPN instances.

The difference between DoS attacks and DDoS attacks is that DoS attacks are usually directly initiated by attackers, whereas DDoS attacks are usually initiated by attackers controlling multiple zombies.

A.

TRUE

B.

FALSE

Which of the following are components of Huawei's anti-DDoS solution?(Select All that Apply)

A.

Detecting center

B.

Management center

C.

Zone

D.

Cleaning center

Which of the following statements is false about the restrictions on configuring bandwidth profiles in parent and child policies on a firewall?

A.

The connection limit specified in a child policy cannot be smaller than that specified in the parent policy.

B.

Both the parent and child policies must both use the same traffic limiting mode; that is, either "setting the upstream and downstream bandwidths" or "setting the overall bandwidth".

C.

The parent and child policies must reference different bandwidth profiles.

D.

The maximum bandwidth specified in a child policy cannot be greater than that specified in the parent policy.

Which of the following statements are true about SYN scanning attacks?(Select All that Apply)

A.

When the scanner sends a SYN packet, an RST response indicates a closed port.

B.

If the peer end does not respond to the SYN packet sent by the scanner, the peer host does not exist, or filtering is performed on the network or host.

C.

When the scanner sends a SYN packet, if the peer end responds with a SYN-ACK packet, the scanner then responds with an ACK packet to complete the three-way handshake.

D.

When the scanner sends a SYN packet, a SYN-ACK response indicates an open port.

Which of the following statements is false about HTTP behavior?

A.

When the size of the uploaded or downloaded file or the size of the content obtained through the POST operation reaches the block threshold, the system blocks the uploaded or downloaded file or POST operation.

B.

When the size of the uploaded or downloaded file or the size of the content obtained through the POST operation reaches the alarm threshold, the system generates a log to notify the device administrator and block the behavior.

C.

You can set an alarm threshold and a block threshold to limit the size of the upload file if file upload is allowed.

D.

The POST method of HTTP is commonly used to send information to the server through web pages. For example, use this method when you post threads, submit forms, and use your username and password to log in to a specific system.