Question 141
Virtual firewalls to forward multiple instances refers to the presence of more than one firewall routing table, supports forwarding address overlapping, are implemented in the same configuration interface, and the user can configure permissions and view all data.
Question 142
Which of the following log categories does the threat log, content log, policy hit log, mail filter log, URL filter log and audit log output by the firewall all fall into?
Question 143
The method of defending a FIN/RST flood attack is to perform a session check. The workflow is to discard the packet and then start the session check when the FIN/RST packet rate exceeds the threshold.
Question 144
With HRP technology, all configuration information of the standby firewall can be synchronized by the main firewall through HRP. No configuration is required, and configuration information is not lost after the restart.
Question 145
SSL VPN authentication is successful, and with the use of the file-sharing feature, you can view the directories and files, but you can not upload, delete, or rename files. What are possible reasons? (Choose two answers)
