Address range rule permit ip source 192.168.11.32 0.0.0.31 represents the?
A. 192.168.11.0-192.168.11.255
B. 192.168.11.32-192.168.11.63
C. 192.168.11.31-192.168.11.64
D. 192.168.11.32-192.168.11.64
The following description of the error on the standard ACL is:
A. Standard access control list,also known as basic access control lists.
B. Standard access control list including rule number,perform an action and the source IP address.
C. Application of standard access control lists typically need only the source address of the packet defined scenes.
D. Standard access control list can be controlled protocol type
Note that when the Clear to clear ISAKMP SA SA Stage 1, and then remove IPSEC SA Phase 2.
A. True
B. False
Digital certificates do not include which of the following section?
A. Name of the certificate holder
B. The certificate is valid
C. Public key certificate
D. Certificate private key
About NAT argument error are: (Choose two)
A. NAT Outbound refers to the source IP address conversion,NAT Inbound refers to the destination IP address conversion
B. NAT Inbound NAT Server commands and command consistent feature configuration can be selected according to personal preference
C. Outbound direction NAT supports the following applications: one -many,many-to-
D. NAT technology to support multi-channel protocols, such as FTP and other standard multi- channel protocol
SVN3000 virtual gateway, domain names can only be accessed using a virtual gateway is which of the following types?
A. Exclusive type
B. Share -based
C. Fixed
D. Manual type
Which of the following is the best technology to solve business interruption issues for some applications (such as an Oracle database application data flow due to extended lead -free connection is interrupted)?
A. Configure a business long connection
B. Configure default session aging time
C. Optimization of packet filtering rules
D. Open the fragment cache
Packet filtering firewall main features include: (Choose three)
A. With the complexity and increase the length of ACL,the firewall filtering performance exponentially decreasing trend
B. ACL rules difficult to adapt static dynamic security filtering requirements
C. Do not check the session state data is not analyzed,it is very easy for hackers to get away
D. Complete control of the network to exchange information and control the session,with high security
VPN by business use classification does not include which of the following?
A. Access VPN
B. Intranet VPN
C. Internet VPN
D. Extranet VPN
Virtual private network (Virtual Private Network) is a "private data channel established through shared public network, each virtual network require access to this network or a terminal connected through tunnels (channels), constituting a dedicated, having certain security and quality of service network.
A. True
B. False