Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-723_V3.0 - HCIP-Security-CTSS V3.0

Page: 2 / 5
Total 169 questions

In the WLAN wireless access scenario, which of the following network security technologies belong to user access security? (Multiple choice)

A.

AP Certification

B.

Linkauthentication

C.

User access authentication

D.

data encryption

A network adopts Portal Authentication, the user finds the pushed Web No username entered on the page/The place of the password. This failure may Which of the following causes?

A.

Agile Controller-CampusThere is no corresponding user on.

B.

switch AAA Configuration error.

C.

The switch is not turned on Portal Function.

D.

Portal The push page on the server is wrong.

Which of the following options are relevant to MAC Certification and MAC The description of bypassauthentication is correct? (Multiple choice)

A.

MAC Certification is based on MAC The address is an authentication method that controls the user's network access authority. It does not require the user to install any client software.

B.

MAC Bypass authentication is first performed on the devices that are connected to the authentication 802 1X Certification;If the device is 802. 1X No response from authentication, re-use MAC The authentication method verifies the legitimacy of the device.

C.

MAC During the authentication process, the user is required to manually enter the user name or password.

D.

MAC The bypass authentication process does not MAC The address is used as the user name and password to automatically access the network.

The user access security solution is one-kind"End to end"Security architecture. The user access security architecture includes three key components:Terminal equipment, network access equipment and access server.

A.

True

B.

False

Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)

A.

If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.

B.

If most end users areconcentrated on--Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.

C.

If end users are scattered in different geographical locations, a distributed deployment solution is recommended.

D.

Ifend users are scattered in different regions, a centralized deployment solution is recommended.

Terminal security access technology does not include which of the following options?

A.

Access control

B.

safety certificate

C.

Authentication

D.

System Management

Which of the following options are right 802. 1X The description of the access process is correct? (Multiple choice).

A.

Through the entire authentication process, the terminal passes EAP The messageexchanges information with the server.

B.

Terminal and 802.1X Switch EAP Message interaction,802.1X Switch and server use Radius Message exchange information

C.

802.1X Authentication does not require security policy checks.

D.

use MD5 The algorithm checksthe information.

Portal authentication on the Agile Controller-Campus has been configured and is correct.

Configure the following commands on the access control switch:

[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255

Which of the following options are correct? (multiple choice)

A.

After the configuration is complete, the switch will automatically release the data flow to access the security controller,No need for manual configuration by the administrator.

B.

This configuration allows users to access network resources before authentication.

C.

After the configuration is complete, the administrator still needs to manually configure the release network segment

D.

Only after the authentication is passed, the terminal can access 10.1.31.78 Host.

For the scenario where the authentication server adopts distributed deployment, which of the following descriptions are correct? (multiple choice)

A.

The enterprise network is relatively scattered, there are multiple branches, and the branch users are larger in scale.

B.

A scenario where there are less than 2,000 branch users, and the headquarters and branch networks are relatively stable.

C.

The terminal security management business between the branch and the headquarters is relatively independent, and the headquarters provides supervision and control over the branch terminal security management business.

D.

It is difficult to guarantee the quality of the network between the branch and the headquarters, and the network between the headquarters and the branch may be interrupted, making the terminal of the

branch no longer available.

When using local guest account authentication, usually use(Portal The authentication method pushes the authentication page to the visitor. Before the user is authenticated, when the admission control device receives the HTTP The requested resource is not Portal Server authentication URL When, how to deal with the access control equipment.

A.

Discard message

B.

URL Address redirected to Portal Authentication page

C.

Direct travel

D.

Send authentication information to authentication server