Question 86
Run the display ike sa command to check the IKE SA information. The following statement is correct?
Question 87
In the IDC room, a Huawei USG6000 series firewall can be divided into several virtual systems. Then, the root firewall administrator generates virtual system administrators to manage each virtual system separately.
Question 88
On the main panel of the Huawei USG6300 firewall, there is a fixed management interface GigabitEthernet 0/0/0 for device management.
Question 89
An attack will fake a source server to send a large number of SYN-ACK packet to the target network or server. If the packet destination port is a TCP service port to be attacked, it will cause the server's TCP protocol stack to handle exceptions.
What attacking technique is this?
Question 90
When the performance difference between servers is large, which of the following algorithms can be used for load balancing?
