A. FALSE
B. TRUE
A. Adopt a unified threat definition language
B. Integrated processing structure
C. PCREX language
D. proprietary hardware for pattern matching, summarization, encryption and decryption, etc.
A. AR169
B. AR511
C. AR513
D. AR1220C
A. Smart Policy strategy optimization
B. Report
C. IPS&AV capture
D. Log
A. Whitelist mode
B. Based on application control
C. Blacklist mode
D. Minimum authorization principle
A. Campus network area isolation
B. Data center protection
C. Enterprise branch security interconnection
D. Internet border protection
A. TRUE
B. FLASE
A. CE6855
B. CE8850
C. CE6870
D. CE6857
A. Cisco
B. Wei Rui
C. Juniper
D. Huasan
A. master and forward dual redundancy
B. self-contained port LAN / WAN support flexible switching
C. the number of own ports > 24
D. autonomous CPU
A. Firewall
B. Intrusion prevention
C. Gatekeeper
D. Vulnerability scanning
A. IP network end-to-end measurement scenario
B. End-to-end measurement scenario for MPLS L3VPN network
C. IP network hop-by-hop measurement scenario