Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-723 - Huawei Certified ICT Professional - Constructing Terminal Security System

Page: 5 / 6
Total 201 questions

A university user requirements are as follows:

1. The environmental flow is larger, two-way add up to OOOM, UTM deployed in its network node.

2. The intranet is divided into students zones, server zones, etc., users are most concerned about the security of the server area, to avoid all kinds of the threat of attack.

3. At the same time to ban students area some pornographic websites.

In UTM configured Extranet for untrust domain, Intranet for trust domain, how to deploy the UTM strategy? (Select 2 answers)

A.

can be directly under the global open AV, PS protective function, URL filtering function, then it can be realized

B.

Outbound direction only open AV, IPS protective function for server areas, protected server

C.

inboud direction only open AV, IPS protective function for server areas, protected server

D.

Outbound direction open URL filtering function for the entire campus network, and filtering of part classification website

For the scenario where the authentication server adopts distributed deployment, which of the following descriptions are correct? (multiple choice)

A.

The enterprise network is relatively scattered, there are multiple branches, and the branch users are larger in scale.

B.

A scenario where there are less than 2,000 branch users, and the headquarters and branch networks are relatively stable.

C.

The terminal security management business between the branch and the headquarters is relatively independent, and the headquarters provides supervision and control over the branch terminal security management business.

D.

It is difficult to guarantee the quality of the network between the branch and the headquarters, and the network between the headquarters and the branch may be interrupted, making the terminal of the

branch no longer available.

Which of the following options belongs to MC prioritized pail Authentication application scenarios?

A.

User use portal Page for authentication

B.

Users follow WeChat for authentication.

C.

User use IAC Client authentication

D.

User use Pota At the first certification,RAOIUS Used by the server cache terminal MAC Address, if the terminal goes offline and then goes online again within the validity period of the cache,RAIUS The server directly searches the cache for the terminal's MAC The address is discussed.

IPS custom signature in UTM supports you to set direction and protocol type.

A.

TRUE

B.

FALSE

About WEB URL filtering technology audit function, which of the following description is correct? (Choose 3 answers)

A.

URL audit function is used to record the user's HTTP Internet behavior as the basis for the audit.

B.

The user can configure the web type to be audited, WEB types to distinguish with file extensions, including html, jsp, aspx, etc.

C.

can audit user HTTP access in the specific content of the Post, as a user Internet censorship

D.

internal users access to the specified type of WEB resource, the firewall will be logged and sent to log server.

After an enterprise deployed antivirus software, it was discovered that virus infections still occurred on a large scale. In addition to the limitations of the product's own technology, the reason for the problem is weak personal terminal security protection, which is also an important factor.

A.

right

B.

wrong

Guest management is Agile Controller-Campus Important function of, regarding visitor management, which of the following statements are correct? (Multiple choice)

A.

Visitors can use their mobile phone number to quickly register an account

B.

The administrator can assign different permissions to each visitor

C.

Reception staff cannot create guest accounts

D.

There is a violation of the guest account, and the administrator cannot retrospectively

According to different reliability requirements, centralized networking can provide different reliability networking solutions. Regarding these solutions, which of the following descriptions are correct? (Multiple choice)

A.

Basic networking includes deploying one SM Server, one SC Server, one DB and a AE server.

B.

AE In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup SC server.

C.

SC In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup SM server.

D.

DB In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup DB..

Which of the following options are relevant to MAC Certification and MAC The description of bypass authentication is correct? (Multiple choice)

A.

MAC Certification is based on MAC The address is an authentication method that controls the user's network access authority. It does not require the user to install any client software.

B.

MAC Bypass authentication is first performed on the devices that are connected to the authentication 802 1X Certification;If the device is 802. 1X No response from authentication, re-use MAC The authentication method verifies the legitimacy of the device.

C.

MAC During the authentication process, the user is required to manually enter the user name or password.

D.

MAC The bypass authentication process does not MAC The address is used as the user name and password to automatically access the network.

About the hardware SACG Certification deployment scenarios, which of the following descriptions are correct? (Multiple choice)

A.

SACG Authentication is generally used in scenarios where a stable network performs wired admission control.

B.

SACG Authentication is generally used in scenarios where new networks are used for wireless admission control.

C.

SACG It is generally deployed in a bypass mode without changing the original network topology.

D.

SACG Essentially through 802.1X Technology controls access users.