Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-723_V3.0 - HCIP-Security-CTSS V3.0

Page: 3 / 5
Total 169 questions

Visitor management can authorize visitors based on their account number,time, location, terminal type, access method, etc., and can also push personalized pages to visitors based on time, location, and terminal type.

A.

True

B.

False

When performing terminal access control, the authentication technology that can be used does not include which of the following options?

A.

8021X Certification

B.

SACG Certification p2-

C.

Bypass authentication

D.

Portal Certification

Portal The second-level authentication method ofauthentication refers to the direct connection between the client and the access device(Or only layer devices exist in between),The device can learn the user’s MAC Address and can be used IP with MAC Address to identify the user.

A.

True

B.

False

Regarding the role of each role in the Portal authentication framework, which of the following descriptions are correct? (multiple choice)

A.

The AAA server saves information such as usernames and passwords for authentication of access users.

B.

The Web server saves informationsuch as user names and passwords for authentication of access users.

C.

The AAA server is used to push the Portal authentication page to the user.

D.

The web server is used to push the Portal authentication page to the user.

Regarding the policy for checking account security, which of the following descriptions are correct? (Multiple choice)

A.

You can check whether there is a weak password.

B.

You can check whether the account has joined a specific group.

C.

It cannot be repaired automatically._

D.

It is not possible to check whether the password length meets the requirements.

If you use a normal account for authentication, which of the following descriptions is wrong?

A.

Users can use Any Office Perform authentication.

B.

User can't use web Way to authenticate.

C.

Users can use Web Agent Perform authentication.

D.

Users can use their own 802. 1X The client authenticates.

Install Agile Controller-Campus Which of the following steps do not need to be completed before?

A.

Install the operating system

B.

Install the database

C.

Install antivirus software

D.

Import License

Regarding the use of MAC authentication to access the network in the WLAN networking environment, which of the following statements is wrong en.

A.

MAC authentication does not require users toinstall any client software.

B.

The user name format used by MAC authentication is only one of MAC address user name format.

C.

MAC authentication actually uses 802 1X authentication method.

D.

MAC bypass authentication solves the situation of both 802.1xclient authentication and MAC authentication in the same network environment.

In the terminal security management, the blackand white list mode is used to check the terminal host software installation status. Which of the following situations is a compliant behavior?

A.

The terminal host does not install the software in the whitelist, nor the software in the blacklist.

B.

The terminal host installs all the software in the whitelist, but does not install the software in the blacklist.

C.

The terminal host installs part of the software in the whitelist, but does not install the software in the blacklist.

D.

The terminal host installs all the software in the whitelist, and also installs some of the software in the blacklist.

Deployed by an enterprise network managerAgile Controller-Campus withSACG Later;Identityauthentication is successful but cannot access the post-authentication domain, This phenomenon may be caused by any reason? (Multiple choice)

A.

A serious violation will prohibit access to the post-authentication domain.

B.

The access control list of the post-authentication domain has not been delivered SACG.

C.

ALC The number of rules issued is too many, and a lot of time is required to match, causing interruption of access services.

D.

Agile Controller-Campus Wrong post-authentication domainresources are configured on the server.