Which of the following statements are correct about IKE-based SA establishment in IPsec?
When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.
Which of the following statements are correct about SYN flood attack defense technologies on Huawei firewalls?
Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*
Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*
In the Linux system, which of the following is the command to query the P address information?
When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21.
While working for a company, Tom receives an email with an attachment. Which of the following operations is correct?
Please match the following information security risks to information security incidents one by one.[fill in the blank]*
physical security risk Enterprise server permissions are loosely set
Information Security Management Risk Infected Panda Burning Incense
Information Access Risk Fire destroyed equipment in computer room
application risk Talk to people about leaking company secrets