Question 36
Which of the following is not included in the trigger authentication method for firewall access user authentication?
Question 37
hen deploying dual-system hot backup on the firewall, in order to switch the overall state of the VRRP backup group, which of the following protocols is required?
Question 38
Which of the following options are characteristic of symmetric encryption algorithms? (multiple choice)
Question 39
Regarding the sequence of call establishment procedures for L2TP corridors, which of the following descriptions is correct?
1. Establish L2TP tunnel
2. Establish a PPP connection
3. LNS authenticates users
4. User access to intranet resources
5. Establish an L2TP session
1. Establish L2TP tunnel
2. Establish a PPP connection
3. LNS authenticates users
4. User access to intranet resources
5. Establish an L2TP session
Question 40
Regarding the description of the intrusion prevention system (IPS), which of the following is wrong?