The SIP protocol uses the SDP message to establish a session, and the SDP message contains the
remote address or multicast address
A
Explanation:
Digital envelope technology means that the sender uses the receiver's public key to encrypt the data
and then sends the ciphertext to the receiver.
A
After the firewall detects a virus, which of the following will release the virus?
C
How many IPSec SAs need to be established to encapsulate P packets using the AH+ESP protocol?
A
Which of the following VPNs cannot be used in site-to-Site scenarios?
D
IPv6 supports configuring the router authorization function on the device, verifying the identity of
the peer through digital certificates, and selecting legal devices.
A
An employee of a company accesses the internal web server of the company through the firewall.
The web page of the website can be opened by using a browser, but the reachability of the web
server is tested by using the Ping command, and it shows that it is unreachable. What are the
possible reasons?
C
Which of the following descriptions about digital fingerprints in digital signatures is wrong?
C
Which of the following SSLVPN functions can and can only access all TCP resources?
C
When the company network administrator configures dual-system hot backup, (fill in the blank)
configure the status of VRRP backup group l as Active, and configure the virtual IP address as
10.1.1.1/24
<sysname>system-view
[sysname] interface GigabitEthernet 0/0/1
[sysname-GigabitEthernet0/0/l] ( ), the command to be typed in the blank is (please fill in the
complete command in all lowercase)
vrrp d 1
virtual-ip 10.1.1.1
active
To configure a NAT policy in command line mode, you need to use the .command ( ) in the system
view to enter the NAT policy configuration view. (all lowercase) (fill in the blank)
nat-policy
( ) means that the computer system has defects and deficiencies in the specific matters of hardware,
software, protocols or system security policies. (Chinese Standard Terminology) (fill in the blank)
Vulnerability
Multiple different ( ) cannot be added to the same interface on the firewall at the same time (fill in
the blank)
Safe area
In USG6000E, the initial priority of VGMP is ( ) (fill in the blank)
45000
( ) is an "indirect intrusion attack. This attack mode is to virtually place a computer controlled by an
intruder between two communicating computers in a network connection through various technical
means. (fill in the blank)
Man-in-the-
middle attack