Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Huawei H12-723 Huawei Certified ICT Professional - Constructing Terminal Security System Exam Practice Test

Page: 1 / 20
Total 201 questions

Huawei Certified ICT Professional - Constructing Terminal Security System Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Windows in environment,Agile Controller-Campus After the installation is successful, how to manually start the management center(MC)? (Multiple choice)

Options:

A.

Double click on the desktop"Start Server"The shortcut starts.

B.

choose"Start>all programs> Huawei> MCServer> StartServer.

C.

choose"Start>all programs> Huawei> Agile Controller> Server Startup Config"To manually start the required components.

D.

choose"Start 3 all programs> Huawei> MCServer> Sever Startup Conig",Manually start the required components

Question 2

Which of the following options is Agile Controller-Campus middle SC The main function of the component?

Options:

A.

As Agile Controller-Campus The management center is responsible for formulating the overall strategy.

B.

As Agile Controller-Campus The management interface is used to configure and monitor the system.

C.

Integrated with standards RADIUS server,Porta Server, etc., responsible for linking with network access equipment to realize user-based network access control Strategy.

D.

As Agile Controller-Campus ’S security assistance server, responsible for iRadar Analysis and calculation of reported security incidents.

Question 3

Which of the following options is about Portal The description of the certification process is correct?

Options:

A.

Portal The certification process is only used in Web Certification

B.

Server for a terminal Portal Certification will only give one Portal Device sends authentication message

C.

Switch received Portal Online message, will give Radius Server send Radius Certification request

D.

Portal The authentication message will not carry the result of the security check

Question 4

When using the misuse of inspection technology, normal user behavior and invasion characteristics knowledge base match successfully will be false positives.

Options:

A.

TRUE

B.

FALSE

Question 5

Regarding the description of the account blacklist, which of the following options is wrong?

Options:

A.

The automatic account lock and manual account lock functions cannot be activated at the same time.

B.

For automatically locked accounts, if the number of incorrect passwords entered by the terminal user during authentication exceeds the limited number of times within a limited time, the account will be automatically locked.

C.

For manually locked accounts, the administrator needs to manually add the account to the locked account list.

D.

Manually lock the account and delete it from the list, the lock of the account will be released.

Question 6

What are the three main steps of business free deployment? (Multiple choice)

Options:

A.

Define security group

B.

Define and deploy group policies

C.

The system runs automatically

D.

Security group reported by the system

E.

Define user groups

Question 7

About the anti-spam local black and white list, which of the following statements is wrong?

Options:

A.

created manually by the user on the USG

B.

black and white list is matched by the sender's DNS suffix

C.

black and white list is by extracting the source IP address of the SMTP connection to match

D.

if the source IP address of the SMTP connection matches the blacklist, blocking the connection

Question 8

After the user is successfully authenticated, Agile Controller-Campus Which of the following actions can be performed on the user(Multiple choice)

Options:

A.

To use Any Office The connected user performs remote assistance.

B.

Force users to go offline.

C.

Audit users' online and offline records.

D.

Disable the mobile certificate account/Disable and assign roles.

Question 9

After an enterprise deployed antivirus software, it was discovered that virus infections still occurred on a large scale. In addition to the limitations of the product's own technology, the reason for the problem is weak personal terminal security protection, which is also an important factor.

Options:

A.

right

B.

wrong

Question 10

In order to increase AP The security can be AC Going online AP Perform authentication. Currently Huawei AC What are the supported authentication methods? (Multiple choice)

Options:

A.

MAC Certification

B.

Password authentication

C.

Not certified:

D.

SN Certification

Question 11

Which of the following behaviors IPS can not detect?

Options:

A.

Virus

B.

Worm

C.

Spam

D.

DOS

Question 12

Hardware in useSACG At the time of certification,SACG After the configuration is completed, you can seeSACG andAgile Agile Controller-Campus The linkage is successful, but the user authentication fails. This phenomenon may be caused by the following reasons? (Multiple choice)

Options:

A.

User flow has not passed SACG.

B.

SACG There is no release on the user stream.

C.

SACG There is no closed state detection on it.

D.

Agile Controller-Campus On and SACG Wrong key configuration for linkage

Question 13

When configuring the antivirus software policy, if you set"The required antivirus software violation level is not installed or running"for"generally"And check"out Now serious violation of the rules prohibits access to the network"Options. When the user uses Any office Certify, The certification is passed, but the result of the security check Can the user access the network when the virus software is not turned on?

Options:

A.

Can access the network? Can also access network resources.

B.

Cannot access the network.

C.

Can pick up? The network needs to be repaired before you can access network resources.

D.

You can access the network, but you need to re-authenticate to access network resources.

Question 14

If the self-determined meter function is enabled on the Agile Controller-Campus and the account PMAC address is bound, Within a period of time, the number of incorrect cipher input by the end user during authentication exceeds the limit. Which of the following descriptions is correct? (multiple choice)

Options:

A.

When the account number is reserved, only the sword type number cannot be authenticated on the bound terminal device, and it can be authenticated normally on other terminal devices.

B.

The account is locked on all terminal devices and cannot be recognized.

C.

If you want to lock out the account, the administrator can only delete the account from the list.

D.

After the lock time, the account will be automatically unlocked

Question 15

The user access security solution is one-kind"End to end"Security architecture. The user access security architecture includes three key components:Terminal equipment, network access equipment and access server.

Options:

A.

right

B.

wrong

Question 16

If you are deploying BYOD When the system is installed, use a stand-alone installation SM, Dual-machine installation SC, Stand-alone hardware deployment AE,Which of the following descriptions are correct? (Multiple choice)

Options:

A.

AE Server priority use)SC server.

B.

Install AE When the server, you need to configure the main and standby SC Server IP address.

C.

If the Lord SC After the server fails,AE The server will use the backup SC server.

D.

host SC After the server is restored,AE Server will not switch back to master SC The server handles the business.

Question 17

Which of the following statement is not correct about application and identification of knowledge base upgrade?

Options:

A.

When USG device unable to connect to the Internet, you can choose local upgrade

B.

When the USG devices can connect to the Internet, can upgrade manually and automatically

C.

The upgrade process of abnormal will not be able to return to the original Knowledge base

D.

You can configure the automatic save function, after saving the upgrade application control is configured as system configuration

Question 18

View on the switch Agile Controller-Campus The policy issued by the server is as follows:

For this strategy, which of the following options are correct? (Multiple choice)

Options:

A.

Common_ user Users can access Internet www H.

B.

VIP Users can access Internet w H.

C.

VIP Can visit Mail Server H.

D.

Common user Users can access Mail_ Sever resource.

Question 19

In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?

Options:

A.

DHCP

B.

ARP

C.

CAPWAP

D.

802.11MAC

Question 20

By default, the device file, there is a knowledge base file in device, during the upgrade, the device will automatically update the knowledge base files and backups.

Options:

A.

TRUE

B.

FALSE

Question 21

IPS custom signature in UTM supports you to set direction and protocol type.

Options:

A.

TRUE

B.

FALSE

Question 22

In the terminal host check strategy, you can check whether the important subkeys and key values ​​of the registry meet the requirements to control the terminal host's Access, which of the following check results will be recorded as violations? (multiple choice)

Options:

A.

The registry does not contain the mandatory requirements of the policy"Subkeys and key values".

B.

The registry contains the mandatory requirements of the policy"Subkeys and key values",

C.

The registry contains the prohibited"Subkeys and key values"W

D.

The registry does not contain any prohibited by this policy"Subkeys and key values"

Question 23

URL filtering, remote classification list provided and maintained by a third-party classification servers, devices can be synchronous updated automatically or manually from third-party classification servers.

Options:

A.

TRUE

B.

FALSE

Question 24

Import the user information of the AD server on the Agile Controller-Campus to realize the user's access authentication. If the user is in the Agile.

The user information is not found on the Controller-Campus. Which of the following actions will be performed in the next step?

Options:

A.

Straight forward to return authentication failure information.

B.

Discard user information.

C.

User 91 Information sent to AD The server performs verification.

D.

Synchronize the database again.

Question 25

Agile Controller-Campus The system architecture belongs to C/S Architecture.

Options:

A.

right

B.

wrong

Question 26

Regarding MAC authentication and MAC bypass authentication, which of the following descriptions are correct? (multiple choice)

Options:

A.

The biggest difference between the two is MAC Bypass authentication belongs to 802 1X Certification, while MAC Certification does not belong to 802 1X Certification.

B.

If a network can connect to dumb terminals(printer,IP telephone), The text may be connected to a portable computer, please use MAC Bypass authentication:First try 802 1X Authentication, try again if authentication fails MAC Certification

C.

If a network will only connect to dumb terminals(printer,IP telephone),please use MAC Certification in order to shorten the certification time.

D.

MAC Authentication MAC One more bypass authentication 802 In the instrument certification process, the open time is longer than MAC The bypass authentication time is long.

Question 27

Agile Controller-Campus The department includes four parts of the management center(MC)Business manager(SM)And business controller(SC)And client network access equipment (NAD)As a component of the solution, it is linked with the service controller to realize user access control and free mobility.

Options:

A.

right

B.

wrong

Question 28

Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.

Options:

A.

right

B.

wrong

Question 29

There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: Agile Controller-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.

Options:

A.

right

B.

wrong

Question 30

Use on access control equipment test-aaa Command test and Radius When the server is connected, the running result shows a timeout, which may be caused by incorrect account or password configuration.

Options:

A.

right

B.

wrong

Page: 1 / 20
Total 201 questions