Huawei Related Exams
H12-724 Exam
In the WLAN wireless access scenario, which of the following network security technologies belong to user access security? (Multiple choice)
Identity authentication determines whether to allow access by identifying the identity of the access device or user.
Which of the following descriptions about the black and white lists in spam filtering is wrong? c