Predefined URL categories on Huawei firewalls reside in the URL category database delivered with the device and do not need to be manually loaded.
Which of the following parameters is not required for an IKE proposal?
The figure shows the defense mechanism of an HTTP flood attack. Which source IP detection technology is displayed in the figure?
Which of the following statements is false about HTTP behavior?
: 52 DRAG DROP
Arrange the steps of the bandwidth management process on firewalls in the correct sequence.
In the figure, enterprise A and enterprise B need to communicate securely, and an IPsec tunnel is established between firewall A and firewall B. Which of the following security protocols and encapsulation modes can meet the requirements of this scenario?
Which of the following actions can be performed when the firewall identifies file anomalies?(Select All that Apply)
Which of the following protocols can be encapsulated through GRE over IPsec?(Select All that Apply)
The figure shows the PBR-based injection scenario. Which of the following statements are true about this scenario?(Select All that Apply)
Which of the following statements is false about health check?
When an IPsec VPN is established in aggressive mode, AH+ESP can be used to encapsulate packets in NAT traversal scenarios.
Trojan horses may disclose sensitive information of victims or even remotely manipulate victims' hosts, causing serious harm. Which of the following are the transmission modes of Trojan horses?(Select All that Apply)
The difference between DoS attacks and DDoS attacks is that DoS attacks are usually directly initiated by attackers, whereas DDoS attacks are usually initiated by attackers controlling multiple zombies.
Huawei iMaster NCE-Campus is a web-based centralized management and control system in the CloudCampus Solution. It supports user access management and can function as multiple types of authentication servers. Which of the following servers can iMaster NCE-Campus not be used as?
In a Huawei network security environment, which of the following is a key advantage of using HWTACACS over RADIUS for device management authentication?
Options:
Which of the following is not a process for remote users to access intranet resources through SSL VPN?
Which of the following statements is false about hot standby networking?(Select All that Apply)
Network Access Control (NAC) is an end-to-end security control technology that works in combination with AAA to implement access authentication. Which of the following statements about NAC and AAA are true?(Select All that Apply)