Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-723_V3.0 - HCIP-Security-CTSS V3.0

Page: 4 / 5
Total 169 questions

An account can only belong toone user group, that is, a user can only belong to one department.

A.

True

B.

False

In the Agile Controller-Campus solution, which device is usually used as the hardwareSACG?

A.

router

B.

switch

C.

Firewall

D.

IPS

Theaccess control server is the implementer of the corporate security policy, responsible for implementing the corresponding access control in accordance with the security policy formulated by the customer's network(Allow, deny, leave or restrict).

A.

True

B.

False

About in WLAN User isolation technology is used in the networking environment. Which of the followingstatements is wrong?

A.

User isolation between groups means that users in different groups cannot communicate, but internal users in the same group can communicate

B.

Isolation within a user group means that users within the same group cannot communicate with each other.

C.

The user isolation function is related to the same AP Layer 2 packets between all wireless users on the Internet cannot be forwarded to each other

D.

Intra-group isolation and inter-group isolation cannot be used at the same time

In some scenarios, ananonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)

A.

The use of anonymous accounts for authentication is based on the premise of trusting the other party, and the authentication agency does not need the other party to provide identity information to provide services to the other party.

B.

Agile Controller-Campus Need to be manually created"~anonymous"account number.

C.

By default, the access control andpolicy of anonymous accounts cannot be performed. 1 Operations such as invoking patch templates and software distribution.

D.

Administrators cannot delete anonymous accounts"~anonymous*.

Which of the following options is right PKI The sequence description of the work process is correct?

1. PKI Entity direction CA ask CA Certificate. .

2. PKI Entity received CA After the certificate, install CA Certificate.

3. CA receive PKI Entity CA When requesting a certificate, add your own CA Certificate reply to PKI entity.

4. PKI Entity direction CA Send a certificate registration request message.

5. PKI When the entities communicate with each other, they need to obtain and install the local certificate of the opposite entity.

6. PKI Entity received CA The certificate information sent.

7. PKI After the entity installs the localcertificate of the opposite entity,Verify the validity of the local certificate of the peer entity. When the certificate is valid,PC The public key of the certificate is used for encrypted communication between entities.

8. CA receive PKI The entity's certificate registration request message.

A.

1-3-5-4-2-6-7-8

B.

1-3-5-6-7-4-8-2

C.

1-3-2-7-6-4-5-8

D.

1-3-2-4-8-6-5-7

Which of the following options are relevant to Any Office The description of the solution content is correct? (Multiple choice)

A.

Provide unified and secure access to enterprise mobile applications on mobile terminals.

B.

The tunnel is dedicated and cannot be penetrated by viruses.

C.

Applications are quickly integrated and can be extended.

D.

It can be quickly integrated and docked with the enterprise application cloud platform.

Business accompanying is-A special access control method, according to the user's access location, access time, access method and terminal use to grant designated investment limits, among which the physical connection can be divided into 3 Class, excluding which of the following access methods?

A.

Wired access

B.

Wireless access

C.

VPN Access

D.

802.1X Access

There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: AgileController-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.

A.

True

B.

False

In the process of establishing CAPWAPchannel between AP and AC, AP and AC negotiate to establish CAPWAP tunnel. In this process, CAPWAP tunnel is established.

Use DTLS to encrypt and transmit UDP packets. What are the encryption methods supported by DTLS? (multiple choice)

A.

Certificate encryption

B.

AES encryption

C.

PSK encryption

D.

Plaintext encryption