Question 91

Which of the following options are correct for the description of URPF technology? (Multiple Choices)
  • Question 92

    Which of the following options are correct for the configuration description of the management center ATIC?
    (multiple choice)
  • Question 93

    For SYN flood attacks, TCP source authentication and TCP proxy can be used for defense.
    Which of the following description is correct?
  • Question 94

    Divert traffic using BGP protocol. The configuration command is as follows.
    [sysname] route-policy 1 permit node 1
    [sysname-route-policy] apply community no-advertise
    [sysname-route-policy] quit
    [sysname] bgp 100
    [sysname-bgp] peer 7.7.1.2 as-number 100
    [sysname-bgp] import-route unr
    [sysname-bgp] ipv4-family unicast
    [sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export
    [sysname-bgp-af-ipv4] peer 7.7.1.2 advertise-community
    [sysname-bgp-af-ipv4] quit
    [sysname-bgp] quit
    Which of the following options are correct for the BGP drainage configuration description? (Multiple choice)
  • Question 95

    Regarding the file filtering configuration file global configuration of the Huawei USG6000 product, which of the following is correct?