Which of the following is a multi -channel protocol?
A. FTP
B. Telnet
C. HTTP
D. SMTP
Interzone packet filtering matching principle is: first find inter-domain Policy, if there is no matching policy, the domain will not find among other strategies, but directly to discard the packet, refused to pass.
A. True
B. False
About GRE checksum verification techniques, when the end of the configuration checksum while the client does not check and when configured correctly described below have () (Choose two) A. The end of paper checks and verification of a received message
B. Peer checks the received packet checksum
C. The end of the checksum is calculated and sent packets
D. For end-to- send packets to calculate the checksum
GRE's features include: (Choose three)
A. Simple mechanism
B. CPU load on both ends of the small tunnel
C. Encrypt data
D. Does not provide traffic control and QoS.
When the port is configured to allow certain vlan trunk through, trunk belongs to these vlan.
A. True
B. False
Servermap used in the table which follows?
A. Quintuple
B. Quad
C. Triples
D. Tuple
Configuration [LAC-l2tp1] start l2tp ip 3.3.2.1 full username pc1 in, ip address 3.3.1.1 means?
A. This initiates an IP address
B. The end of the virtual template address
C. The LNS public address
D. Virtual template addresses the LNS
IP-Link auto- detection results can only be applied to detect double hot backup.
A. True
B. False
The vast majority of endpoint security threats from Internet, internal network only need to deploy anti-virus software can solve the problem.
A. True
B. False
Normal access to the user Wang credited l2tp vpn from outside the network address, found inside the firewall can ping the network port, but cannot access the network server, check the configuration discovery, Virtual-Template is added to the untrust zone within the network port in trust area, resulting in the cause cannot access the server, the following statements is correct? (Choose two)
A. The server is not configured gateway
B. Untrust and trust between domain rules unopened
C. Untrust and local inter-domain rules unopened
D. The other three options are correct