Huawei Related Exams
H12-724 Exam

Regarding the file source set in the software management, which of the following descriptions is correct?
Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?
If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)