Question 76
The method of collecting information by port scanning using scanning tools belongs to the means of ( ) analysis. (fill in the blank)
Question 77
at HuaweiUSGOn the series firewalls, the default security policy does not support modification.
Question 78
The preservation of electronic evidence is directly related to the legal validity of the evidence, and the authenticity and reliability of the preservation in compliance with legal procedures can be guaranteed. Which of the following is not an evidence preservation technique?
Question 79
When the FW is deployed at the network egress, if a fault occurs, it will affect the Zaonet service. to enhance the network Reliability, need to deploy two FWs and form ______[fill in the blank]*
Question 80
In the Client-Initiated VPN configuration, it is generally recommended to plan the address pool and headquarters network address as different network segments, otherwise you need to turn on the proxy forwarding function on the gateway device.