And relationship that is only if the information in

This preview shows page 47 - 50 out of 70 pages.

"And" relationship, that is, only if the information in the message and all fields match, it is considered tohit this policy.A. YesB. wrongCorrect Answer:BSection: (none)
ExplanationExplanation / Reference:QUESTION 200The matching principle of the security policy is: first find the manually-configured inter-domain securitypolicy, and if it does not match, discard the packet directly.
Section: (none)ExplanationExplanation / Reference:QUESTION 201Which of the following is the response action of the gateway antivirus after detecting a mailvirus? (Multiple choices)
Section: (none)ExplanationExplanation / Reference:QUESTION 202
Digital signature is to generate a digital fingerprint by using a hashing algorithm to ensure the integrity ofdata transmission
Section: (none)ExplanationExplanation / Reference:QUESTION 203Regarding NAT address translation, which of the following statements is wrong?A. Configure NAT address pool in source NAT technology, you can configure only one IP address in theaddress poolB. Address translation can provide FTP, WWW, Telnet and other services to the outside in the LANaccording to user needsC. Some application layer protocols carry IP address information in the data. When they are NATed, theIP address information in the upper layer data must be modified.D. For some TCP and UDP protocols (such as ICMP, PPTP), NAT cannot be performed.Correct Answer:DSection: (none)
ExplanationExplanation / Reference:QUESTION 204When a NAT server is configured on the firewall of the USG system, a server-map table is generated.Which of the following is not included in the performance?Section: (none)
ExplanationExplanation / Reference:QUESTION 205Which of the following options are malicious programs? (Multiple choices)
Section: (none)ExplanationExplanation / Reference:QUESTION 206Which of the following are the main implementation methods of gateway antivirus? (Multiple choices)
Section: (none)ExplanationExplanation / Reference:QUESTION 207Which of the following options is not part of the hashing algorithm?A. MD5B. SHA1C. SM1D. SHA2Correct Answer:CSection: (none)
Explanation59Explanation / Reference:QUESTION 208Regarding the description of firewall dual-system hot backup, which of the following options arecorrect? (Multiple choices)

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 70 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
IP address

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture