Question 36

Which of the following is not included in the trigger authentication method for firewall access user authentication?
  • Question 37

    hen deploying dual-system hot backup on the firewall, in order to switch the overall state of the VRRP backup group, which of the following protocols is required?
  • Question 38

    Which of the following options are characteristic of symmetric encryption algorithms? (multiple choice)
  • Question 39

    Regarding the sequence of call establishment procedures for L2TP corridors, which of the following descriptions is correct?
    1. Establish L2TP tunnel
    2. Establish a PPP connection
    3. LNS authenticates users
    4. User access to intranet resources
    5. Establish an L2TP session
  • Question 40

    Regarding the description of the intrusion prevention system (IPS), which of the following is wrong?