Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

H12-723 Huawei Certified ICT Professional - Constructing Terminal Security System Questions and Answers

Questions 4

Deploying on Windows platform, using SQL Server database About the HA function of Agile Cotoller-Campus, which of the following descriptions Is it correct? (multiple choice)

Options:

A.

Deployment Management Center MC Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.

B.

Deploy Business Manager SM Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.

C.

Deploy business controller 3SC Time, support HA, Provide a backup solution in resource pool mode, which needs to be deployed N+1 indivual SC

D.

Deploy the database DB Time, support HA use SQL Server Database mirroring technology requires the deployment of master DB+Mirroring DB+witness DB.

Buy Now
Questions 5

The traditional campus network is based on IP As the core network, if there are mobile office users, which of the following options is not the problem that mobile office users face when deploying access authentication?

Options:

A.

The user distribution range is large, and the access control requirements are high.

B.

The deployment of the access control strategy is significant.

C.

Access rights are difficult to control.

D.

User experience technology

Buy Now
Questions 6

Which of the following options is Agile Controller-Campus middle SC The main function of the component?

Options:

A.

As Agile Controller-Campus The management center is responsible for formulating the overall strategy.

B.

As Agile Controller-Campus The management interface is used to configure and monitor the system.

C.

Integrated with standards RADIUS server,Porta Server, etc., responsible for linking with network access equipment to realize user-based network access control Strategy.

D.

As Agile Controller-Campus ’S security assistance server, responsible for iRadar Analysis and calculation of reported security incidents.

Buy Now
Questions 7

In the Agile Controller-Campus admission control technology framework, regarding the description of RADIUS, which of the following options is correct?

Options:

A.

PADIUS Used on the client and 802.1X Information such as user names and passwords are passed between switches.

B.

PADIUS Used in 802.1X Switch and AAA Information such as user name and password are passed between servers.

C.

PADIUS Used for Portal Server pushes to users Web page.

D.

PADIUS Used for server to SACG Security policy issued by the device

Buy Now
Questions 8

How to check whether the SM and SC silverware start normally after installing the Agile Controller-Campus) (multiple delivery)

Options:

A.

Open https://SM server IP:8943 in the browser, enter the account admin and the default password Changeme123, if the login is successful, it will be explained. The SIM components are normal.

B.

After logging in to SC, select Resources>Users>User Management to create a common account. Open https://SM server IP:8447 in the browser newauth, if you can successfully log in using the account created in the previous step, the SM component is normal.

C.

Open https://SC Server IP:8443 in the browser and enter the account admin and the default password Changeme123. If the login is successful, it will be explained. The SC component is normal.

D.

After logging in to SM, select Ziyuan>User>User Management, and Xinlu has a common part number. Open https://SC server IP:8447 newauth in the browser. If you can successfully log in with the account created in the previous step, it means that the SC component is Wang Chang.

Buy Now
Questions 9

Which of the following description is incorrect against server loophole security threats ?

Options:

A.

worms using application software loophole to spread wantonly, consume network bandwidth and destroy important data.

B.

hackers, malicious employee use loophole to attack or invade enterprise servers, business secrets were tampered, damaged and theft .

C.

As long as the system software update in time for system loophole problems can be effectively solved.

D.

The Internet has made application software loophole to spread rapidly, making loophole easier to become targets of attack.

Buy Now
Questions 10

In some scenarios, an anonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)

Options:

A.

The use of anonymous accounts for authentication is based on the premise of trusting the other party, and the authentication agency does not need the other party to provide identity information to provide services to the other party.

B.

Agile Controller-Campus Need to be manually created"~anonymous"account number.

C.

By default, the access control and policy of anonymous accounts cannot be performed. 1 Operations such as invoking patch templates and software distribution.

D.

Administrators cannot delete anonymous accounts"~anonymous*.

Buy Now
Questions 11

In Portal authentication, which of the following parameters must be configured on the switch? (Multiple choice)

Options:

A.

Portal server IP

B.

Portal page URL

C.

shared-key

D.

Portal Protocol version

Buy Now
Questions 12

Portal The second-level authentication method of authentication refers to the direct connection between the client and the access device(Or only layer devices exist in between),The device can learn the user’s MAC Address and can be used IP with MAC Address to identify the user.

Options:

A.

right

B.

wrong

Buy Now
Questions 13

Which of the following options cannot be triggered MAC Certification?

Options:

A.

ARP Message

B.

DHCP Message P

C.

DHCPv6 Message

D.

ICMP Message

Buy Now
Questions 14

An account can belong to multiple roles, that is, a user may hold multiple positions.

Options:

A.

right

B.

wrong

Buy Now
Questions 15

Enterprise Intranet users access to the Internet, what may cause the UFL filtering function failure? (Select 3 answers)

Options:

A.

no reference URL filtering strategy in Web filtering policy

B.

no Web filtering strategy applied in the corresponding direction in inter-domain

C.

the URL filtering strategy in the corresponding filter sub-function switch did not open

D.

Web content filtering is not enabled

Buy Now
Questions 16

MAC Certification refers to 802.1x In the protocol authentication environment, the terminal does not respond to the connection control device after accessing the network 802.1x When protocol authentication is requested, the access control does not automatically obtain the terminal’s MAC The address is sent as a credential to access the network RADIUS The server performs verification.

Options:

A.

right

B.

wrong

Buy Now
Questions 17

In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.

The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario of inconsistent traffic back and forth paths, this needs to turn off the session state check function.

Options:

A.

right

B.

wrong

Buy Now
Questions 18

There is a three-layer forwarding device between the authentication client and the admission control device:If at this time Portal The certified three-layer authentication device can also obtain the authentication client's MAC address,So you can use IP Address and MC The address serves as the information to identify the user.

Options:

A.

right

B.

wrong

Buy Now
Questions 19

A network adopts Portal Authentication, the user finds the pushed Web No username entered on the page/The place of the password. This failure may Which of the following causes?

Options:

A.

Agile Controller-Campus There is no corresponding user on.

B.

switch AAA Configuration error.

C.

The switch is not turned on Portal Function.

D.

Portal The push page on the server is wrong.

Buy Now
Questions 20

When using the misuse of inspection technology, normal user behavior and invasion characteristics knowledge base match successfully will be false positives.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

Agile Controller-Campus The system can manage the software installed on the terminal, define the black and white list of software, and assist the terminal to install necessary software and uninstall the software that is not allowed to be installed by linking with the access control equipment,Regarding the definition of black and white lists, which of the following statements is correct?

Options:

A.

Check for prohibited software licenses and sub-licensed software

B.

Check for prohibited software

C.

Check for prohibited software and software that must be installed

D.

Check the software that must be installed

Buy Now
Questions 22

Regarding the policy for checking account security, which of the following descriptions are correct? (Multiple choice)

Options:

A.

You can check whether there is a weak password.

B.

You can check whether the account has joined a specific group.

C.

It cannot be repaired automatically._

D.

It is not possible to check whether the password length meets the requirements.

Buy Now
Questions 23

Which of the following options is about SACG The description of the online process is wrong?

Options:

A.

Terminal and Agile Controller-Campus Server communication SSL encryption

B.

Authentication fails, end users can only access resources in the pre-authentication domain

C.

Security check passed,Agile Controller-Campus Server notification SACG Will end user's IP Address switch to isolated domain

D.

Agile Controller-Campus Server gives SACG Carrying domain parameters in the message

Buy Now
Questions 24

Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.

Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?

Options:

A.

User domain

B.

Network domain

C.

Business domain:

D.

Attack domain

Buy Now
Questions 25

Which of the following cybersecurity threats exist only in WLAN In the network?

Options:

A.

Brute force

B.

Crowd attack

C.

DoS Denial of service attack

D.

Weak IV attack

Buy Now
Questions 26

There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: Agile Controller-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.

Options:

A.

right

B.

wrong

Buy Now
Questions 27

Which of the following options is right PKI The sequence description of the work process is correct?

1. PKI Entity direction CA ask CA Certificate. .

2. PKI Entity received CA After the certificate, install CA Certificate.

3. CA receive PKI Entity CA When requesting a certificate, add your own CA Certificate reply to PKI entity.

4. PKI Entity direction CA Send a certificate registration request message.

5. PKI When the entities communicate with each other, they need to obtain and install the local certificate of the opposite entity.

6. PKI Entity received CA The certificate information sent.

7. PKI After the entity installs the local certificate of the opposite entity,Verify the validity of the local certificate of the peer entity. When the certificate is valid,PC The public key of the certificate is used for encrypted communication between entities.

8. CA receive PKI The entity's certificate registration request message.

Options:

A.

1-3-5-4-2-6-7-8

B.

1-3-5-6-7-4-8-2

C.

1-3-2-7-6-4-5-8

D.

1-3-2-4-8-6-5-7

Buy Now
Questions 28

In WPA2, because of the more secure encryption technology-TKIP/MIC, WPA2 is more secure than WPA.

Options:

A.

right

B.

wrong

Buy Now
Questions 29

What are the three main steps of business free deployment? (Multiple choice)

Options:

A.

Define security group

B.

Define and deploy group policies

C.

The system runs automatically

D.

Security group reported by the system

E.

Define user groups

Buy Now
Questions 30

After configuring the announcement,Agile Controller-Campus The system cannot assign this announcement to which of the following objects?

Options:

A.

Assign to user

B.

Assigned to account

C.

Assign to terminal IP Address range

D.

Assigned to places

Buy Now
Exam Code: H12-723
Exam Name: Huawei Certified ICT Professional - Constructing Terminal Security System
Last Update: Nov 21, 2024
Questions: 201
H12-723 pdf

H12-723 PDF

$28  $80
H12-723 Engine

H12-723 Testing Engine

$33.25  $95
H12-723 PDF + Engine

H12-723 PDF + Testing Engine

$45.5  $130