If there is no hard disk installed on the firewall, when a network intrusion event is found, the event will be recorded in the () log. (fill in the blank)
There are two ways for a PKI entity to apply for a local certificate from a CA: ( ). (fill in the blank)
After an engineer completes the source NAT configuration, the internal network still cannot access the external network. The engineer wants to query the detailed information of the address translation by using the command to query the session table, so the engineer directly uses the ( ) command in the user view to query the address translation. information. (fill in the blank)
The backup methods of dual-system hot backup include automatic backup ( ), manual batch backup, and automatic synchronization of the configuration of the active and standby FW after the device restarts. (fill in the blank)
( ) is an "indirect intrusion attack. This attack mode is to virtually place a computer controlled by an intruder between two communicating computers in a network connection through various technical means. (fill in the blank)
Submit Cancel