Huawei Related Exams
H12-711_V3.0 Exam

After a network intrusion event occurs, the identity of the intrusion, the source of the attack and other information are obtained according to the plan, and the intrusion behavior is blocked. The above actions belong to PDRR. What are the links in the network security model? (multiple choice)
According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*
TCSECWhich of the following protection levels are included in the standard? (multiple choice)