Huawei H12-711 Practice Test - Questions Answers, Page 47
List of questions
Related questions
IPSec VPNs use pre-shared keys, ( ) and digital envelopes to authenticate peers. (fill in the blank)
When we use digital signature technology, the receiver needs to use the sender's ( ) to unlock the digital signature to get the digital fingerprint. (fill in the blank)
( ) Can block discovered network intrusions in real time. (fill in the blank)
If there is no hard disk installed on the firewall, when a network intrusion event is found, the event will be recorded in the () log. (fill in the blank)
There are two ways for a PKI entity to apply for a local certificate from a CA: ( ). (fill in the blank)
The method of collecting information by port scanning using scanning tools belongs to the means of ( ) analysis. (fill in the blank)
Under normal circumstances, the terminal number used by the RADIUS server to provide accounting services is ( ). (fill in the blank)
In digital signature technology, we usually encrypt the digital fingerprint with the sender's ( ). (fill in the blank)
When the FW is deployed at the network egress, if a fault occurs, the entire network service will be affected. In order to improve the reliability of the network, two FWs need to be deployed and formed ( ) (fill in the blank)
There are three types of frame forwarding behaviors: flooding, ( ), and discarding. (fill in the blank)
Question