Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H12-723 Exam Dumps - Huawei Certified ICT Professional - Constructing Terminal Security System

Question # 4

A network adopts 802. 1X To authenticate access users, the access control equipment is deployed at the convergence layer, and after the deployment is completed, it is used on the access control equipment t-aa The command test is successful, but the user cannot access the network. The failure may be caused by the following reasons? (Multiple choice)

A.

The aggregation layer device is not configured RADIUS Certification template.

B.

Agile Controller-Campus The switch is not added on NAS equipment.

C.

Connect to the terminal on the device to open 802.1X Function.

D.

The Layer 2 link is used between the access device and the aggregation device, and it is not turned on 802 Instrument transparent transmission function

Full Access
Question # 5

Business accompanying is-A special access control method, according to the user's access location, access time, access method and terminal use to grant designated investment limits, among which the physical connection can be divided into 3 Class, excluding which of the following access methods?

A.

Wired access

B.

Wireless access

C.

VPN Access

D.

802.1X Access

Full Access
Question # 6

How to check whether the SM and SC silverware start normally after installing the Agile Controller-Campus) (multiple delivery)

A.

Open https://SM server IP:8943 in the browser, enter the account admin and the default password Changeme123, if the login is successful, it will be explained. The SIM components are normal.

B.

After logging in to SC, select Resources>Users>User Management to create a common account. Open https://SM server IP:8447 in the browser newauth, if you can successfully log in using the account created in the previous step, the SM component is normal.

C.

Open https://SC Server IP:8443 in the browser and enter the account admin and the default password Changeme123. If the login is successful, it will be explained. The SC component is normal.

D.

After logging in to SM, select Ziyuan>User>User Management, and Xinlu has a common part number. Open https://SC server IP:8447 newauth in the browser. If you can successfully log in with the account created in the previous step, it means that the SC component is Wang Chang.

Full Access
Question # 7

What do the common virus behavior characteristics include?(select 3 answers)

A.

Download and backdoor characteristics

B.

Information Collection feature

C.

own hidden feature

D.

system attacks characteristics

Full Access
Question # 8

Visitors can access the network through their registered account. Which of the following is not an account approval method?

A.

Exemption from approval

B.

Administrator approval

C.

Receptionist approval

D.

Self-approved by visitors

Full Access
Question # 9

SACG Inquire right-manager The information is as follows, which options are correct? (Multiple choice)

A.

SACG and IP Address is 2.1.1.1 The server linkage is unsuccessful.

B.

SACG The linkage with the controller is successful.

C.

main controller IP address is 1.1.1.2.

D.

main controller IP address is 2.1.1.1.

Full Access
Question # 10

Which of the following options are right 802. 1X The description of the access process is correct? (Multiple choice).

A.

Through the entire authentication process, the terminal passes EAP The message exchanges information with the server.

B.

Terminal and 802.1X Switch EAP Message interaction,802.1X Switch and server use Radius Message exchange information

C.

802.1X Authentication does not require security policy checks.

D.

use MD5 The algorithm checks the information.

Full Access
Question # 11

Security authentication is mainly achieved through security policies. The terminal host support management for the security check of monthly users is mainly realized by loose check policies. End user behavior management is mainly realized by monitoring policies. If users need to formulate policies according to their own wishes, they can use them. Custom strategy.

A.

right

B.

wrong

Full Access
Question # 12

Traditional access control policy passed ACL or VLAN Can not be achieved with IP Address decoupling, in IP The maintenance workload is heavy when the address changes. And because the agile network introduces the concept of security group, it can achieve the same IP Address decoupling.

A.

right

B.

wrong

Full Access
Question # 13

Which of the following options are correct for the description of visitor management? (Multiple choice)

A.

Visitor registration account can be configured to be exempt from approval

B.

Guest login can only be configured as Web Way of webpage

C.

Anonymous account authentication cannot be performed on the guest authentication page

D.

Visitor account approval information can be notified to visitors via SMS

Full Access
Question # 14

Install Agile Controller-Campus Which of the following steps do not need to be completed before?

A.

Install the operating system

B.

Install the database

C.

Install antivirus software

D.

Import License

Full Access
Question # 15

The traditional campus network is based on IP As the core network, if there are mobile office users, which of the following options is not the problem that mobile office users face when deploying access authentication?

A.

The user distribution range is large, and the access control requirements are high.

B.

The deployment of the access control strategy is significant.

C.

Access rights are difficult to control.

D.

User experience technology

Full Access
Question # 16

There are two ways for Business Manager to download patches. When using hierarchical deployment, you can download patches directly from the management center or through Microsoft patches Server download patch.

A.

right

B.

wrong

Full Access
Question # 17

Portal page push rules have priority, and the rules with higher priority are matched with the user's authentication information first. If none of the configured rules match, The default rules are used.

A.

right

B.

wrong

Full Access
Question # 18

The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.

When the account is distributed to users, what stage does the distribution of the account belong to?

A.

Page customization stage

B.

Account application stage

C.

User authentication phase

D.

Audit and cancellation stage

Full Access
Question # 19

Visitors refer to users who need temporary access to the network at a specific location.

A.

right

B.

wrong

Full Access
Question # 20

Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.

Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?

A.

User domain

B.

Network domain

C.

Business domain:

D.

Attack domain

Full Access
Question # 21

Regarding the definition of WIPS/WIDS, which of the following statements is correct?

A.

WIDS Is a wireless intrusion prevention system

B.

WIPS Wireless intrusion detection system

C.

WIDS Is a wireless intrusion countermeasure system

D.

WIPS Is a wireless intrusion prevention system

Full Access
Question # 22

Agile Controller-Campus Which deployment mode is not supported?

A.

Centralized deployment

B.

Distributed deployment

C.

Hierarchical deployment

D.

Two-machine deployment

Full Access
Question # 23

About the software SACG And hardware SACG Description, which of the following is correct?

A.

hardware SACG use Any Office Perform admission control.

B.

software SACG use Any Office Perform admission control.

C.

hardware SACG Than software SACG cut costs.

D.

hardware SACG The security is higher.

Full Access
Question # 24

What are the three main steps of business free deployment? (Multiple choice)

A.

Define security group

B.

Define and deploy group policies

C.

The system runs automatically

D.

Security group reported by the system

E.

Define user groups

Full Access
Question # 25

Regarding the way SACG devices connect to the network, which of the following descriptions are correct? (multiple choice)

A.

SACG The equipment requires Layer 3 intercommunication with the terminal.

B.

SACG It is usually connected to the core switch equipment and uses policy routing to divert traffic.

C.

SACG Support hanging on non-Huawei devices.

D.

SACG Equipment requirements and Agile Controller-Campus Interoperability on the second floor.

Full Access
Question # 26

BY00 The products and textiles provided by the history solution program cover the entire terminal network\Application and management and other fields/include: Serialization BC Equipment, paperless network system network access support, VPN Gateway, terminal security customer ladder software, authentication system, mobile device management(MDN),move eSpace UC.

A.

right

B.

wrong

Full Access
Question # 27

In the visitor reception hall of a company, there are many temporary terminal users, and the administrator hopes that users do not need to provide any account numbers and passwords. access Internet. Which of the following authentication methods can be used for access?

A.

Local account authentication

B.

Anonymous authentication

C.

AD Account Verification

D.

MAC Certification

Full Access
Question # 28

Free mobility is a special access control method, according to the user’s access location, access time, access method and terminal authorization instructions. Set permissions, as long as the user’s access conditions remain unchanged, the permissions and network experience after accessing the network--To q

A.

right

B.

wrong

Full Access
Question # 29

Regarding the principle of MAC authentication, which of the following descriptions is wrong?

A.

MAC Certification required Portal Server cooperation.

B.

MAC Certification is passed 802.1X Implementation of the agreement.

C.

MAC Authentication requires obtaining the terminal’s MAC The address is stored in AAA server.

D.

NAS Device Configuration MAC After authentication, the terminal’s MAC The address is used as the username and password.

Full Access
Question # 30

Mobile smartphone, tablet PC users through Any Office Client and AE Establish IPSec Encrypted tunnel, After passing the certification and compliance check, visit the enterprise business.

A.

right

B.

wrong

Full Access