Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-723_V3.0 - HCIP-Security-CTSS V3.0

Page: 5 / 5
Total 169 questions

When the account assigned by the administrator for the guest is connected to the network, the audit action that the administrator can perform on the guest does not include which of the following options?

A.

Visitor online and offline records

B.

Force users to go offline

C.

Account deactivation 1 reset Password

D.

Send a warning message to the user

The useraccesses the network through the network access device, and the third-party RADIUS server authenticates and authorizes the user. Regarding the certification process, which of the following options is wrong?

A.

Configure RADIUS authentication and accountingon the RADIUS server.

B.

Configure the Agile Controller-Campus for local data source authentication, receive the packets sent by the device, and perform authentication.

C.

Configure RADIUS authentication and accounting on the device side. W"

D.

ConfigureRADIUS authentication and authorization on the Agile Controller-Campus.

Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?

A.

Directly discard data sent by devices that do not comply withregulations

B.

Certification of non-compliant equipment.

C.

Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.

D.

Send alarm information to notify the administrator to deal with it.

The following configuration is in A with B The authentication commands are configured on the two admission control devices. For the analysis of the following configuration commands, which ones are correct? (Multiple choice)

A.

A What is configured on the device is MAC Bypass authentication

B.

B What is configured on the device is MAC Bypass authentication o

C.

A On the device 2GE1/01 Can access PC Can also access dumb terminal equipment

D.

B On the device GE1/0/1 Can access PC It can also access dumb terminal equipment. Upper

Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.

Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?

A.

User domain

B.

Network domain

C.

Business domain:

D.

Attack domain

Agile Controller-Campus The system can manage the software installed on the terminal, define the black and white list of software, and assist the terminal to install necessary software and uninstall the software that is not allowed to be installed by linking with the access control equipment,Regarding the definition of black and white lists, which of the following statements is correct?

A.

Check for prohibited software licenses and sub-licensed software

B.

Check for prohibited software

C.

Check for prohibited software and software that must be installed

D.

Check the software that must be installed

User access authentication technology does not include which of the following options?

A.

Authentication

B.

Isolation repair'

C.

Security check

D.

Access control

Which of the following equipment is suitable for use MAC Authentication access network?

A.

Office Windows Systemhost

B.

For testing Linux System host

C.

Mobile client, such as smart phone, etc

D.

Network printer 232335

Regarding the principle of MAC authentication, which of the following descriptions is wrong?

A.

MAC Certification required Portal Server cooperation.

B.

MACCertification is passed 802.1X Implementation of the agreement.

C.

MAC Authentication requires obtaining the terminal’s MAC The address is stored in AAA server.

D.

NAS Device Configuration MAC After authentication, the terminal’s MAC The address is used asthe username and password.

The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.

When the account is distributed to users, what stage does the distribution of the account belong to?

A.

Page customization stage

B.

Account application stage

C.

User authentication phase

D.

Audit and cancellation stage