In the TCP three-way handshake,for packet SYN (seq = b, ack = a +1), the following statement is there?
A. Confirmation of the number of data packets is b
B. A +1 on the number of packets that are recognized
C. A desired number of the next data packet received is b
D. A desired number of the received packet is a +1
About Advanced ACL, the following statements is correct?(Choose two)
A. Advanced ACL can match the source IP address
B. Advanced ACL can match the destination IP address
C. Advanced ACL can match the source MAC address
D. Advanced ACL can match the destination MAC address
What are the main cryptographic services security capabilities?(Choose three)
A. Confidentiality
B. Integrity
C. Repudiation
D. Scalability
Source host sends ARP-request, the data package source IP address field of the source host IP address, source MAC address field is the MAC address of the source host,destination IP address field of the destination host IP address, destination MAC address of the destination host is encapsulated MAC address
A. True
B. False
GRE VPN itself does not have to provide data integrity verification and confidentiality of transmission capacity.
A. True
B. False
SSL protocol by which elements to accomplish?(Choose three)
A. Handshake protocol
B. Record Protocol
C. Warning agreement
D. Heartbeat Protocol
The main scope of NAT host visits in the same security domain,you need to convert the IP address of the target host via NAT outbound command.
A. True
B. False
Which of the following is a multi -channel protocol?
A. FTP
B. Telnet
C. HTTP
D. SMTP
Network extensions that do not support the following access modes:
A. Separation mode (Split Tunnel)
B. Full routing mode (Full Tunnel)
C. Fixed Mode (Fixed Tunnel)
D. Manual mode (Manual Tunnel)
The following area is not about TSM is?
A. Pre-authentication domain is the area by the client before authentication can be accessed
B. After authentication domain is the area the client can access through the security certification
C. Isolated domain refers to the area by the client access authentication must
D. Isolated domain is required for access to the area when the client security authentication failure