Which of the following operating modes does NTP support?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A, B, C, D
Explanation
:
Q: 2
_____ Authentication is to configure user information (including local user's user name, password
and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Explanation
:
Q: 3
Which of the following is the numbering range of Layer 2 ACLs?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Explanation
:
Q: 4
Which of the following descriptions of single sign-on is correct?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B
Explanation
:
Q: 5
A Web server is deployed in an enterprise intranet to provide Web access services to Internet users,
and in order to protect the access security of the server, it should be divided into the _____ area of
the firewall.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Explanation
:
Q: 6
Which of the following protocols is a file transfer protocol?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B, D
Explanation
:
Q: 7
DRAG DROP
Please classify the following security defenses into the correct classification.
When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is
empty, the switch discards the unicast frame.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B
Explanation
:
Q: 9
In cases where some configurations alter existing session table entries and want them to take effect
immediately, you can regenerate the session table by clearing the session table information. All
session table information can be cleared by executing the _____firewall session table command.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Explanation
:
Q: 10
What are the correct entries in the following description of firewall security zones?