Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-723 - Huawei Certified ICT Professional - Constructing Terminal Security System

Page: 6 / 6
Total 201 questions

In the terminal security all-round defense system, use PPT-PDCA The model can effectively implement terminal security defense. Which of the following options does not belong to PPT Model?

A.

technology

B.

Process

C.

organization

D.

plan

According to the user’s access5W1H Conditions determine access rights andQoS Strategy for5W1Ho[Which of the following descriptions are correct? (Multiple choice)

A.

WhoTo determine the ownership of the access device(Company standard,BYOD Wait)

B.

WhoseTo determine the identity of the access person(member I, Visitors, etc.)

C.

How Determine the access method(Wired, wireless, etc.)

D.

WhatTo determine the access device(PC,iOS Wait)

When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result shows success, but the user cannot Normal access, the possible reason does not include which of the following options?

A.

The access layer switch does not start EAP Transparent transmission function.

B.

wireless 02K In the scenario, the access control device is not equipped with a security board

C.

AD The service controller is not added in the authentication scenario AD area.

D.

The user account or password is incorrectly configured.

In the Agile Controller-Campus admission control scenario, regarding the role description of the RADIUS server I client, which of the following is positive True?

A.

Agile Controller-Campus Integrated RADIUS All functions of server and client."

B.

Agile Controller-Campus As RADIUS On the server side, the user terminal acts as RADIUS Client.

C.

Certified equipment(like 802. 1X switch)As RADIUS On the server side, the user terminal acts as RADIUS Client.

D.

Agile Controller-Campus As RADIUS Server side, authentication device(like 802.1X switch)As RADIUS Client.

In the visitor reception hall of a company, there are many temporary terminal users, and the administrator hopes that users do not need to provide any account numbers and passwords. access Internet. Which of the following authentication methods can be used for access?

A.

Local account authentication

B.

Anonymous authentication

C.

AD Account Verification

D.

MAC Certification

In the Agile Controller-Campus solution, which device is usually used as the hardware SACG?

A.

router

B.

switch

C.

Firewall

D.

IPS

In the WLAN wireless access scenario, which of the following network security technologies belong to user access security? (Multiple choice)

A.

AP Certification

B.

Link authentication

C.

User access authentication

D.

data encryption

Configuring DNS server of RBL feature on USG, which of the following statement is not correct?

A.

must use the DNS server not been DNS hijacking

B.

must use recursive query DNS server

C.

DNS server should be reachable IP

D.

DNS server must listen on port 25

How to check whether the MC service has started 20?

A.

View in task manager TMCSever Whether the service is started.

B.

View in task manager TMCServerDaemon Whether the service is started.

C.

View in task manager TMCServer with TMCSeverDaemon Whether the service is started.

D.

Select on the server"Start>all programs> Huawei> Agile Cortroler> Sever rtrller",an examination MC Whether the status is"run".

Wired 802.1X During authentication, if the access control equipment is deployed at the Jiangju layer, this deployment method has the characteristics of high security performance, multiple management equipment, and complex management.

A.

right

B.

wrong