Which two statements are true regarding AppFlow? ()(Choose t

题目
多选题
Which two statements are true regarding AppFlow? ()(Choose two.)
A

Accelerates NFS file sharing, MAPI, and HTTP 1.0.

B

Accelerates CIFS, MAPI, and additional TCP traffic specified by app rules.

C

Accelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.

D

Accelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are true with regard to policy ordering? ()(Choose two.)

A. The last policy is the default policy, which allows all traffic.

B. The order of policies is not important.

C. New policies are placed at the end of the policy list.

D. The insert command can be used to change the order.


参考答案:C, D

第2题:

Which two statements are true about precedence values in policy?() (Choose two.)

A. 1 is the default precedence.

B. A lower number is preferred.

C. A higher number is preferred.

D. 100 is the default precedence.


参考答案:B, D

第3题:

The RECYCLEBIN parameter is set to ON for your database. You drop a table, PRODUCTS, from the SCOTT schema.Which two statements are true regarding the outcome of this action? ()(Choose two)

A. All the related indexes and views are automatically dropped

B. The flashback drop feature can recover only the table structure

C. Only the related indexes are dropped whereas views are invalidated

D. The flashback drop feature can recover both the table structure and its data


参考答案:C, D

第4题:

When defining an application for AppFlow acceleration, which two must be configured on the WX device?()(Choose two.)

A. Define application type.

B. Enable AppFlow for the application.

C. Enable monitoring for the application.

D. Define source and destination IP addresses.


参考答案:A, B

第5题:

Which two CIFS commands are accelerated by AppFlow? ()(Choose two.)

A. ReadX

B. Write AndX

C. Trans2 Query

D. Tree Disconnect


参考答案:A, B

第6题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

A. The same key is used for encryption and decryption.

B. It is commonly used to create digital certificate signatures.

C. It uses two keys: one for encryption and a different key for decryption.

D. An attacker can decrypt data if the attacker captures the key used for encryption.


参考答案:A, D

第7题:

Which two statements are true regarding L2TP? ()(Choose two.)

A. Tunnels are initiated by the LAC

B. Tunnels are initiated by the LNS

C. By default, subscriber authentication occurs on the LNS

D. By default, subscriber authentication occurs on the LAC


参考答案:A, C

第8题:

Which two statements are true about AH?() (Choose two.)

A. AH provides data integrity.

B. AH is identified by IP protocol 50.

C. AH is identified by IP protocol 51.

D. AH cannot work in conjunction with ESP


参考答案:A, C

第9题:

Which two statements are true regarding AppFlow? ()(Choose two.)

A. Accelerates NFS file sharing, MAPI, and HTTP 1.0.

B. Accelerates CIFS, MAPI, and additional TCP traffic specified by app rules.

C. Accelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.

D. Accelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.


参考答案:C, D

第10题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

更多相关问题