Question 1
Which of the following can be supported by Policy Center access control? (Choose three.)
A. Hardware SACG (hardware security access control gateway)
B. 802.1X
C. ARP control
D. Software SACG (host firewall)
Question 2
SSL VPN supported file sharing types can be divided into two kinds of SMB and NFS, SMB correspond Windows hosts, NFS correspond Linux host
A. True
B. False
Question 3
Which user authentication methods can be supported by Policy Center system? (Choose three.)
A. IP address authentication
B. MAC address authentication
C. Ordinary ID/password authentication
D. LDAP authentication
Question 4
Network administrators set up networking as follows:LAN_A --------- (G0/0) USG_A (G0/1) --------- (G0/0) USG_B (G0/1) -------------- LAN_B USG_A divides firewall security zones, connects LAN_A areas Trust, connects USG_B area's Untrust, according to the above description, which of the following statement is correct?
A. USG_B G0/0 must join Untrust zone
B. USG_B G0/0 must join the Trust zone
C. USG_B G0/1 must join the Trust zone
D. USG_B G0/0 can join any regional
Question 5
In the first stage of IKE negotiation, which of the following IKE exchange mode does not provide identity protection features?
A. Main Mode
B. Aggressive Mode
C. quick mode
D. passive mode
Question 6
Which of the following encryption algorithm, encryption and decryption keys are the same?
A. DES
B. RSA(1024)
C. MD5
D. SHA-1
Question 7
Policy Center system can implement two dimensions' management functions: organizational management and regional management
A. True
B. False
Question 8
What does USG products business include? (Choose three.)
A. Web Proxy
B. Network Expansion
C. Port sharing
D. File Sharing
Question 9
Which of the following components do consist of Policy Center system? (Choose three.)
A. Anti-virus server
B. SC control server
C. Access control equipment
D. SM management server
Question 10
In IPSEC VPN, which of the following scenarios can be applied by tunnel mode?
A. between the host and the host
B. between hosts and security gateways
C. between security gateways
D. between tunnel mode and transport mode