Certificates saved in DER format may or may not contain a private key.
What type of ACL does ACL number 3001 correspond to?
Which of the following statements is incorrect about Portal authentication?
Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*
Which of the following operating modes does NTP support?
What is correct in the following description of Security Alliance in IPSec?
There are two ways to set up an IPSec SA
Match the following user categories and authentication modes.

Which of the following descriptions of single sign-on is correct?
A three-way handshake is required to establish a TCP connection, and a four-way handshake is required to end a TCP connection.
Which of the following statements are correct about firewall security zones?
Which of the following statements are correct about IKE-based SA establishment in IPsec?
In cases where some configurations alter existing session table entries and want them to take effect immediately, you can regenerate the session table by clearing the session table information. All session table information can be cleared by executing the _____firewall session table command.
The RADIUS protocol specifies how to pass user information, billing information, authentication and billing results between the NAS and the RADIUS server, and the RADIUS server is responsible for receiving the user's connection request, completing the authentication, and returning the result to the NAS.
Which of the following protocols is a multichannel protocol?
In hot standby networking, the heartbeat interfaces of the two firewalls must be directly connected.
The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).
Which of the following are the default zones of Huawei firewalls?
Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.
The trigger authentication method for firewall access user authentication does not include which of the following?
Which of the following characteristics does a denial-of-service attack include?
Which of the following functions help implement IPsec secure transmission of user service data on the Internet by means of encryption and authentication?
As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules?

Which of the following attacks can be detected through intrusion prevention?
Which of the following is not an encryption algorithm in a VPN?
The traffic direction of a firewall is based on the zone priority. The _____ direction refers to the direction from a low-priority zone to a high-priority zone. Capitalize the first letter.
Which of the following statements is incorrect about DoS attacks?
The following description of digital certificates, which one is wrong
Which of the following is not the matching mode of the firewall security protection whitelist rules?
As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

Which of the following authentication modes are supported by AAA?
Which of the following statements are correct about the PKI system structure?
Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.
Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*
During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*
What is the security level of the Untrust zone in Huawei firewalls?
DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.
Which of the following is not the default security zone of the firewall
Which of the following statements is incorrect about information transmission through the heartbeat link between two firewalls that work in hot standby mode?
Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*
As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )
Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*
In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.
An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*
Arrange the following processes in the correct order based on the PKI lifecycle.
