Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*
IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]
An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*
Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.
Which of the following is not included in the Business Impact Analysis (BIA).
The following description of the AH protocol in IPSec VPN, which one is wrong?
At what layer does packet filtering technology in the firewall filter packets?
The following description of IDS, which items are correct
The IDS cannot be linked to the firewall.
What is the security level of the Untrust zone in Huawei firewalls?
Regarding the characteristics of the routing table, which of the following items is described correctly
Data monitoring can be divided into two types: active analysis and passive acquisition.
Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities
When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.