Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H12-723 - Huawei Certified ICT Professional - Constructing Terminal Security System

Page: 1 / 6
Total 201 questions

Agile Controller-Campus As RADIUS When the server performs authentication, how many ends need to be configured for authentication on the admission control device?

A.

1812

B.

1813

C.

8443

D.

8080

If you use a normal account for authentication, which of the following descriptions is wrong?

A.

Users can use Any Office Perform authentication.

B.

User can't use web Way to authenticate.

C.

Users can use Web Agent Perform authentication.

D.

Users can use their own 802. 1X The client authenticates.

Which of the following statement is correct about AV engine when Execute the command display av version?

A.

version loaded successfully

B.

did not load

C.

Loading

D.

not enough information to determine

Which of the following law items is the most blessed for safety? This should be true?

A.

Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00

B.

Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.

C.

The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.

D.

Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.

In WPA2, because of the more secure encryption technology-TKIP/MIC, WPA2 is more secure than WPA.

A.

right

B.

wrong

In a centralized networking, the database, SM server, SC server, and AE server are all centrally installed in the corporate headquarters. This networking method is suitable. It is used for enterprises with a wide geographical distribution of users and a large number of users.

A.

right

B.

wrong

Which of the following options is right PKI The sequence description of the work process is correct?

1. PKI Entity direction CA ask CA Certificate. .

2. PKI Entity received CA After the certificate, install CA Certificate.

3. CA receive PKI Entity CA When requesting a certificate, add your own CA Certificate reply to PKI entity.

4. PKI Entity direction CA Send a certificate registration request message.

5. PKI When the entities communicate with each other, they need to obtain and install the local certificate of the opposite entity.

6. PKI Entity received CA The certificate information sent.

7. PKI After the entity installs the local certificate of the opposite entity,Verify the validity of the local certificate of the peer entity. When the certificate is valid,PC The public key of the certificate is used for encrypted communication between entities.

8. CA receive PKI The entity's certificate registration request message.

A.

1-3-5-4-2-6-7-8

B.

1-3-5-6-7-4-8-2

C.

1-3-2-7-6-4-5-8

D.

1-3-2-4-8-6-5-7

About the anti-spam local black and white list, which of the following statements is wrong?

A.

created manually by the user on the USG

B.

black and white list is matched by the sender's DNS suffix

C.

black and white list is by extracting the source IP address of the SMTP connection to match

D.

if the source IP address of the SMTP connection matches the blacklist, blocking the connection

Which of the following options are right 802. 1X The description of the access process is correct? (Multiple choice).

A.

Through the entire authentication process, the terminal passes EAP The message exchanges information with the server.

B.

Terminal and 802.1X Switch EAP Message interaction,802.1X Switch and server use Radius Message exchange information

C.

802.1X Authentication does not require security policy checks.

D.

use MD5 The algorithm checks the information.

Perform the UTM upgrade in the process of operation, appeared the following information:

Error: Executing the update, please wait.

USG may be executed (choose 3 answers)

A.

online upgrade

B.

there are business flow being processed

C.

local upgrade

D.

install the factory default version