About BFD detection mechanism, the following statement is correct? (Choose two answers)
A. BFD control packets are encapsulated in TCP packets
B. BFD provides two detection modes: asynchronous and synchronous mode
C. After the establishment of a BFD session, both systems periodically send BFD control packets
D. At the beginning of the session, the two sides negotiate through the control system carried in the packet parameters
HTTP Flood attacks refer indirectly to the target server to initiate a large number of HTTP packets to burden the server so that it can not respond to normal requests.
Through the interface rate limit function, HTTP flood attacks can be prevented.
A. TRUE
B. FALSE
In L2TP over IPsec scenarios, The USG device will first use the original data packet that is encrypted using IPsec, and then encapsulates the data packets using L2TP.
A. TRUE
B. FALSE
When a Haiwei Secure VPN client connection initializes using L2TP, the L2TP packet uses a source port of 1710, and a destination port of 1710.
A. TRUE
B. FALSE
Which of the following statements is wrong regarding IPsec?
A. Under Transfer Mode, ESP does not validate the IP header
B. AH can not verify that the data uses encrypted packets
C. ESP can support NAT traversal
D. The AH protocol uses the 3DES algorithm for data validation
A simple network is connected PC1-USG-Router-PC2. If PC1 sends packets to PC2, and the USG processes fragmented packets, which modes can be used to do this? (Choose three answers)
A. fragment cache
B. slice discarded
C. fragmentation direct forwarding
D. slicing defense
In USG2200 series of products, GigabitEthernet 0/0/0 is the band management interface by default.
A. TRUE
B. FALSE
Which of the following packets are not sent during IP-link detection? (Choose two answers)
A. ARP packets
B. IGMP packets
C. ICMP packets
D. Hello packets
Refer to the following NIP firewall intrusion detection actions: 1 records the invasion process, alarm logging
2. NIP attack detection 3 reconfigure the firewall 4 Termination invasion Which of the following is the correct sequence of events?
A. 1 -> 2 -> 3 -> 4
B. 2 -> 1 -> 3 -> 4
C. 3 -> 1 -> 2 -> 4
D. 1 -> 2 -> 4 -> 3
When an attack occurs, the attacked host (1.1.128.4) was fooled. Host found many packets as shown. Based on an analysis what type of attack is this?
A. Smurf attack
B. Land Attack
C. WinNuke
D. TCP packet flag attack