<< Prev Question Next Question >>

Question 55/75

There are multiple real servers in an enterprise network that provide FTP services to the outside world, and the load balancing function is configured to ensure the load balancing of traffic flowing through the USG.
The administrator hopes that by detecting the real server status, the load ratio of each server is the same as the weight ratio. The following suitable configurations are:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (75q)
Question 1: When configuring the address set on the firewall, the config...
Question 2: The ISO27000 series includes several security standards, whi...
Question 3: If you use a mobile terminal (Android or Apple system) to ac...
Question 4: Which of the following are the IKE encryption algorithms sup...
Question 5: Comparing the two technologies of mail content filtering and...
Question 6: In the Remote Access VPN scenario, the remote PC uses the Se...
Question 7: Mobile employees access the headquarters through an L2TP ove...
Question 8: The log information output of the USG firewall is as follows...
Question 9: In the scenario of dual-system hot backup of firewalls, IPse...
Question 10: In the abnormal traffic cleaning solution, automatic drainag...
Question 11: The Trust zone of the USG firewall of a certain network is c...
Question 12: A company is engaged in e-commerce through the Internet, and...
Question 13: MAC authentication is applicable in which of the following s...
Question 14: When using the UTM function, the link state detection functi...
Question 15: The customer has a USG6000, and the remote PC wants to acces...
Question 16: Next-generation firewalls perform content inspection at each...
Question 17: Regarding the trigger mechanism of 802.1X authentication, wh...
Question 18: Which statement is true about certificate OCSP and CRL techn...
Question 19: The networking of a network is as follows: PC----ADSL router...
Question 20: In the Anti-DDoS abnormal traffic cleaning solution, the cor...
Question 21: Which of the following descriptions about IP-Link is incorre...
Question 22: Which of the following attacks utilizes the mechanism that a...
Question 23: Which statement is false about client-side troubleshooting w...
Question 24: The correct description of the no-reverse parameter in the f...
Question 25: The USG and the Router establish a Site-to-Site IPsec VPN. B...
Question 26: Due to the network upgrade of the new USG_A and USG_B softwa...
Question 27: The following configuration, when the physical state of inte...
Question 28: The firewall is deployed between the mobile terminal of the ...
Question 29: In the dual-system hot-standby network, the service interfac...
Question 30: For the admission control of the existing wired network, the...
Question 31: The terminal uses Agent for 802.1x authentication, the IP ad...
Question 32: The IPsec status information of a network is as follows, [US...
Question 33: Regarding the Internet access area in the data, the correct ...
Question 34: Which of the following statements about hot standby is corre...
Question 35: As shown in the figure, the routing example between the virt...
Question 36: If the hardware security access control gateway adopts the n...
Question 37: What are the URL matching methods in the URL filtering funct...
Question 38: IPsec tunnel communication is used between the headquarters ...
Question 39: When using the SSL VPN network extension function, the virtu...
Question 40: When the network traffic is heavy, if you do not want the do...
Question 41: Regarding the authentication mode of 802.1X, which of the fo...
Question 42: In the USG, the planning UTM statement is correct...
Question 43: Which fields in the packet need to be analyzed in the firewa...
Question 44: The correct order of URL filtering processing flow is: ① Th...
Question 45: The packet encapsulation of L2TP Over IPsec is:...
Question 46: An FTP server ( DMZ ) on the existing network of the enterpr...
Question 47: A PC receives a fragmented package as shown in the figure be...
Question 48: In Huawei NGFW, the network with inconsistent packet return ...
Question 49: Which of the following tasks need to be completed before con...
Question 50: By viewing the configuration information of a USG firewall r...
Question 51: A company has the following requirements: The intranet users...
Question 52: For a registered USB storage device, if the administrator re...
Question 53: NIP5000 devices support setting some interfaces to IDS mode....
Question 54: In the TCP spoofing attack, in order to establish a fake TCP...
Question 55: There are multiple real servers in an enterprise network tha...
Question 56: A network deploys the AntiDdos cleaning equipment at the net...
Question 57: A server on the network has been responding very slowly rece...
Question 58: Which of the following packets can be unicast packets...
Question 59: What are the methods for firewalls to diagnose forwarding fa...
Question 60: Which of the following statements about hot standby is corre...
Question 61: The difference between IKEv1 and IKEv2, which of the followi...
Question 62: The following configuration commands are executed on the nor...
Question 63: Which protocols can the NGFW perform virus scanning and corr...
Question 64: In the L2TP Over IPsec scenario, the central node uses the I...
Question 65: Which of the following functions are functions of SSL VPN?...
Question 66: In the Agile Controller solution, the USG is used for hardwa...
Question 67: What aspects need to be checked for IPS (Intrusion Preventio...
Question 68: Which of the following descriptions about SACG certification...
Question 69: Configuration database mirroring fails in Agile Controller, ...
Question 70: What functions does content filtering include in the Huawei ...
Question 71: In a new campus network of an enterprise, there is a require...
Question 72: Which of the following is correct for the functional compari...
Question 73: View the session table information on the firewall as follow...
Question 74: In the abnormal traffic cleaning scheme, re-injection refers...
Question 75: The centralized networking scheme of three servers, as shown...