1. session下载a device can be assigned an IP address 192.168.13.175,with the mask being 255.255.255.240
True              False
False
2. an ospf hello message carries a list of known neighbors
True              False
True
3. only router-LSAs and Network-LSAs are involved in intra-area route calculations
True              False
True
4. only one BGP process can be configured on a router
True              False
True
5. an ip-prefix-filter is used to filter ip prefixes and data packets
True              False
False
6. RSTP has all functions that STP has and it is backward compatible with STP.
True                False
True
7. TO enable an eudemon in routing mode to work like a router,you need to assign ip addresses to interfaces and enable dynamic or static routing protocols on the eudemon.
True              False
True
8. The eudemon that is working in transparent mode detects processes data at layer 2.Its interfaces are not configured with ip addresses.
True              False
True
9. When an eudemon is working in composite mode,some of its interfaces are configured with ip addresses (Layer 3 interfaces) and the other interfaces are not configured with ip addresses(Layer 2 interafces). To enable dual-system hot backup on an eudemon,you can configure the eudemon to work in composite mode.
True              False
True
10. Two Eudemons in dual-system hot backup can be working in active-active mode or acti
ve-standby mode.
True              False
True
11. The eudemon supports load balancing between multiple uplinks.
True              False
True
12. Different virtual firewall instances on an Eudemon must be configured with the same security policy.
True              False
False
13. The firewall can be working in routing mode, transparent mode,or composite mode. The
default mode is the composite mode.
True              False
False
14. Virtual firewalls on the Eudemon are not allowed to access each other by default unless a security policy is specified.
True              False
True
15. IP addresses added to the blacklist of the Eudemon cannot be deleted.
True              False
False
16. You cannot set an aging time for the blacklist of the Eudemon.
True              False
False
17. The Eudemon generates a blacklist upon detecting an attack.
True              False
False
18. The Eudemon can control traffic and connections based on IP addresses.
True                False
True
19. The firewall does not use security rules to filter packets exchanged between interfaces in the same zone.
True                False
True
20. Network address translation (NAT) translates only IP address information.
True                False
False
21. IP unnumbered is to borrow an IP address from an interface.If an interface has multiple IP addresses,all its IP addresses will be borrowed and the primary address will continue after these IP addresses are borrowed.
True                False
False
22. When two Eudemon are working in dual-system hot backup mode,their session tables are backed up in real time.
True                False
True
23. After an interface on a firewall is added to a zone, the interface belongs to the zone.
True                False
True
24. Status detection is an advanced communication filtering mechanism.It checks the application layer protocol and monitors the status of the connection-based application layer protocol.For all connections,the status information about each connection is maintained by ASPF and is used to dynamically determine whether to permit or deny data packets to firewalls.
True                  False
True
25. The NAT multi-instance function on the Eudemon independently maintains a NAT table
for each instance to provide address translation services for instances.
True                False
True
26. The IPSec function on the Eudemon supports NAT traversal.
True                False
True
27. The NAT function enabled on the Eudemon does not greatly affect system performance.
True                False
True
28. The Eudemon does not support port mapping.
True                False
False
29. In a Land attack,the source address and destination address of an SYN packet are both the IP address of the attacked object or a loopback address.
True                False
True
30. The association between the IDS and firewall requires that the IDS be directly connected to the firewall.
True                False
False
31. Security policies for the firewall are applied to interzones but not to interfaces.
True                False
True
32. The multi-channel protocol is used to establish at least two channels(sessions) for communications or services.

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。