Huawei Related Exams
H12-724 Exam
Regarding the description of intrusion detection technology, which of the following statements is correct?
In the WLAN wireless access scenario, which of the following network security technologies belong to user access security? (Multiple choice)
Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?