Question 111
What is the correct statement about the binding of local users to VPN instances?
Question 112
An intranet has made a network, the old equipment is offline, the new network equipment is brought online, and after the service test, it is found that most of the original service traffic cannot work normally. What is the quickest way to restore the business?
Question 113
The ACK flood attack uses a botnet to send a large number of ACK packets, which impacts the network bandwidth and causes network link congestion. If the number of attack packets is large, the server processing performance is exhausted, thus rejecting normal services. Under the Huawei Anti-DDoS device to prevent this attack, compare the two processing methods - strict mode and basic mode, what is correct?
Question 114
Virtual firewall virtualizes multiple logical firewalls on a physical firewall device and implements multiple instances?
Question 115
Load balancing has the following configuration:
[USG] sIb enable
[USG] sIb
[USG-slb] rserver 1 rip 10.1.1.3 weight 32
[USG-slb] rserver 2 rip 10.1.1.4 weight 16
[USG-slb] rserver 3 rip 10.1.1.5 weight 32
[USG-slb] group test
[USG-slb-group-test] metric srchash
[USG-slb-group-test] add rserver 1
[USG-slb-group-test] add rserver 2
[USG-slb-group-test] add rserver 3
Which of the following statements is correct? (Choose two answers)
