Huawei H12-711 Practice Test - Questions Answers, Page 47
List of questions
Question 461

IPSec VPNs use pre-shared keys, ( ) and digital envelopes to authenticate peers. (fill in the blank)
Question 462

When we use digital signature technology, the receiver needs to use the sender's ( ) to unlock the digital signature to get the digital fingerprint. (fill in the blank)
Question 463

( ) Can block discovered network intrusions in real time. (fill in the blank)
Question 464

If there is no hard disk installed on the firewall, when a network intrusion event is found, the event will be recorded in the () log. (fill in the blank)
Question 465

There are two ways for a PKI entity to apply for a local certificate from a CA: ( ). (fill in the blank)
Question 466

The method of collecting information by port scanning using scanning tools belongs to the means of ( ) analysis. (fill in the blank)
Question 467

Under normal circumstances, the terminal number used by the RADIUS server to provide accounting services is ( ). (fill in the blank)
Question 468

In digital signature technology, we usually encrypt the digital fingerprint with the sender's ( ). (fill in the blank)
Question 469

When the FW is deployed at the network egress, if a fault occurs, the entire network service will be affected. In order to improve the reliability of the network, two FWs need to be deployed and formed ( ) (fill in the blank)
Question 470

There are three types of frame forwarding behaviors: flooding, ( ), and discarding. (fill in the blank)
Question