Question 11
            
                    
                    
Which of the following are included in the operating system patch violations level of Terminal security system? (Choose two.)
                        
                        
                        
                            
                                A. Low 
                            
                            
                        
                        
                        
                            
                                B. Important 
                            
                            
                        
                        
                        
                            
                                C. Serious 
                            
                            
                        
                        
                        
                            
                                D. General 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 12
            
                    
                    
What does ACL 2999 belong to?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Basic Access Control Lists 
                            
                            
                        
                        
                        
                            
                                B. Advanced Access Control Lists 
                            
                            
                        
                        
                        
                            
                                C. Access control list based on MAC address 
                            
                            
                        
                        
                        
                            
                                D. Time-based access control list 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 13
            
                    
                    
Which of the following scenarios does not support by IPSEC WEB configuration of USG6000 series firewall? (Choose two.)
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Gateway to Gateway 
                            
                            
                        
                        
                        
                            
                                B. Gateway Center 
                            
                            
                        
                        
                        
                            
                                C. Branch Gateway 
                            
                            
                        
                        
                        
                            
                                D. Host and Host 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 14
            
                    
                    
What port numbers may be used by FTP protocol? (Choose two.)
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. 20 
                            
                            
                        
                        
                        
                            
                                B. 21 
                            
                            
                        
                        
                        
                            
                                C. 23 
                            
                            
                        
                        
                        
                            
                                D. 80 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 15
            
                    
                    
Some applications, such as Oracle database application, there is no data transfer for a long time, so that firewall session connection is interrupted, thus resulting in service interruption, which of the following technology can solve this problem?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Configure a long business connection 
                            
                            
                        
                        
                        
                            
                                B. Configure default session aging time 
                            
                            
                        
                        
                        
                            
                                C. Optimization of packet filtering rules 
                            
                            
                        
                        
                        
                            
                                D. Turn fragment cache 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
	
     
     
            
            Question 16
            
                    
                    
Which of the following option belongs to DES key length?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. 56 
                            
                            
                        
                        
                        
                            
                                B. 64 
                            
                            
                        
                        
                        
                            
                                C. 128 
                            
                            
                        
                        
                        
                            
                                D. 192 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 17
            
                    
                    
Terminal security access control can support? (Choose three.)
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. SACG hardware (hardware security access control gateway) 
                            
                            
                        
                        
                        
                            
                                B. 802.1X 
                            
                            
                        
                        
                        
                            
                                C. ARP control 
                            
                            
                        
                        
                        
                            
                                D. Software SACG (host firewall) 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 18
            
                    
                    
What are the main security capability of encryption service? (Choose three.)
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Confidentiality 
                            
                            
                        
                        
                        
                            
                                B. Integrity 
                            
                            
                        
                        
                        
                            
                                C. Non-repudiation 
                            
                            
                        
                        
                        
                            
                                D. Scalability 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 19
            
                    
                    
When Layer 2 switches (not configured VLAN) receiving a data frame, of no match is found in the MAC address table, it will forward the data frame to all ports(including Layer 2 switches receiving port).
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. True 
                            
                            
                        
                        
                        
                            
                                B. False 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 20
            
                    
                    
How to view the matching number of security policy?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. display current-configuration 
                            
                            
                        
                        
                        
                            
                                B. display policy all 
                            
                            
                        
                        
                        
                            
                                C. display startup saved-configuration 
                            
                            
                        
                        
                        
                            
                                D. display device