Which of the following statements is false about web rewriting in web proxy?
Network Access Control (NAC) is an end-to-end security control technology that works in combination with AAA to implement access authentication. Which of the following statements about NAC and AAA are true?(Select All that Apply)
In quota control policies, which of the following can be set for users?(Select All that Apply)
Which of the following items are recorded in the IPS service module logs of a Huawei NGFW?(Select All that Apply)
In SSL VPN, the firewall performs access authorization and control based on which of the following dimensions?
Which of the following conditions can be matched by PBR?(Select All that Apply)
Which of the following protocols can be encapsulated through GRE over IPsec?(Select All that Apply)
Match the HTTP control items with the corresponding descriptions.
Authentication rules configured on iMaster NCE-Campus support multiple matching conditions, such as matching account information, SSID information, and terminal IP address ranges, so that different authentication rules can be executed for different users.
Sort the intrusion prevention steps in sequence based on the working mechanism of the firewall device.
The Nginx application is deployed on a Linux host. By checking Nginx logs, O&M engineers can obtain the complete URL information submitted by users and determine whether the Linux host is under SQL injection attacks.
During deployment of Portal authentication, an authentication-free rule profile needs to be configured to ensure Portal pages can be opened on authentication terminals. To achieve this purpose, the following traffic needs to be permitted in the authentication-free rule profile: DNS resolution traffic of user terminals, traffic from user terminals for accessing Portal pages, and traffic from user terminals to the RADIUS server.
Which of the following statements is true about the incoming traffic in the firewall virtualsystem?(Select All that Apply)
Which of the following statements is false about Eth-Trunk?(Select All that Apply)
Which of the following methods are used by flood attacks to cause denial of services?(Select All that Apply)
When Eth-Trunk is deployed for the heartbeat links between firewalls, the Eth-Trunk interface can be configured as a Layer 2 interface as long as the total bandwidth of active links on the Eth-Trunk is greater than 30% of the bandwidth required by service traffic.
: 51 DRAG DROP
Match the description about virtual systems and VPN instances.
When gateways are connected using GRE over IPsec, the IPsec encapsulation mode must be tunnel mode.