Question 6

When a user accesses the virtual gateway, the user can access the SSL VPN only after the user terminal passes the host check policy.
  • Question 7

    In the figure, if 802.1X authentication is used for wired users on the network, the network admission device and terminals must be connected through a Layer 2 network.

    Options:
  • Question 8

    IPsec VPN does not support encapsulation of non-IP unicast packets.
  • Question 9

    Before configuring DDoS attack defense, you must configure different thresholds for defense against different types of attacks. Each threshold can be considered an upper limit for normal network traffic.
    When the rate of traffic exceeds the pre-configured threshold, the firewall considers it to be attack traffic and takes a corresponding action to defend against it.
  • Question 10

    In a Huawei network security environment, which of the following is a key advantage of using HWTACACS over RADIUS for device management authentication?
    Options: