The following describes port scanning Which is wrong? (single selection).
The target IP address information can be collected through attacks, such as distributed denial-of-service attacks to obtain the target's IP information. (single selection).
Which is the correct order for IPS to process traffic? (single selection).
When it is not in the same deployment as the log server, only FW can send conference logs to the log server through the IPSec tunnel and GRE tunnel (single selection).