Question 11
Which of the following are included in the operating system patch violations level of Terminal security system? (Choose two.)
A. Low
B. Important
C. Serious
D. General
Question 12
What does ACL 2999 belong to?
A. Basic Access Control Lists
B. Advanced Access Control Lists
C. Access control list based on MAC address
D. Time-based access control list
Question 13
Which of the following scenarios does not support by IPSEC WEB configuration of USG6000 series firewall? (Choose two.)
A. Gateway to Gateway
B. Gateway Center
C. Branch Gateway
D. Host and Host
Question 14
What port numbers may be used by FTP protocol? (Choose two.)
A. 20
B. 21
C. 23
D. 80
Question 15
Some applications, such as Oracle database application, there is no data transfer for a long time, so that firewall session connection is interrupted, thus resulting in service interruption, which of the following technology can solve this problem?
A. Configure a long business connection
B. Configure default session aging time
C. Optimization of packet filtering rules
D. Turn fragment cache
Question 16
Which of the following option belongs to DES key length?
A. 56
B. 64
C. 128
D. 192
Question 17
Terminal security access control can support? (Choose three.)
A. SACG hardware (hardware security access control gateway)
B. 802.1X
C. ARP control
D. Software SACG (host firewall)
Question 18
What are the main security capability of encryption service? (Choose three.)
A. Confidentiality
B. Integrity
C. Non-repudiation
D. Scalability
Question 19
When Layer 2 switches (not configured VLAN) receiving a data frame, of no match is found in the MAC address table, it will forward the data frame to all ports(including Layer 2 switches receiving port).
A. True
B. False
Question 20
How to view the matching number of security policy?
A. display current-configuration
B. display policy all
C. display startup saved-configuration
D. display device