Question: 1
Defense against the cache server The main method of DNS request flood is to use the DNS source
authentication technology:
A. TRUE
B. FALSE
Answer: A
Question: 2
What are the drainage schemes that can be used in the scenario of bypass deployment in Huawei's
abnormal traffic cleaning solution?
A. dynamic routing drainage
B. static policy routing drainage
C. static route drainage
D. MPLS VPN drainage
Answer: ABCD
Question: 3
Which of the following statements is correct about the IKE main mode and the aggressive mode?
A. All negotiation packets in the first phase of the aggressive mode are encrypted.
B. All the negotiation packets of the first phase in the main mode are encrypted.
C. barbarian mode uses DH algorithm
D. will enter the fast mode regardless of whether the negotiation is successful or not.
Answer: C
Question: 4
Accessing the headquarters server through the IPSec VPN from the branch computer. The IPSec tunnel
can be established normally, but the service is unreachable. What are the possible reasons?
A. packet is fragmented, and fragmented packets are discarded on the link.
B. There is load sharing or dual-machine link, which may be inconsistent with the back and forth path.
C. route oscillating
D. DPD detection parameters are inconsistent at both ends
Answer: A
No comments:
Post a Comment