Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-724 - HCIP-Security (Fast track) V1.0

Page: 1 / 11
Total 367 questions

Portal authentication on the Agile Controller-Campus has been configured and is correct.

Configure the following commands on the access control switch:

[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255

Which of the following options are correct? (multiple choice)

A.

After the configuration is complete, the switch will automatically release the data flow to access the security controller,No need for manual configuration by the administrator.

B.

This configuration allows users to access network resources before authentication.

C.

After the configuration is complete, the administrator still needs to manually configure the release network segment

D.

Only after the authentication is passed, the terminal can access 10.1.31.78 Host.

Visitors refer to users who need temporary access to the network at a specific location.

A.

True

B.

False

Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?

A.

Directly discard data sent by devices that do not comply with regulations

B.

Certification of non-compliant equipment.

C.

Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.

D.

Send alarm information to notify the administrator to deal with it.

An enterprise administrator configures the Web reputation system as shown in the figure. Regarding the configuration, which of the following statements is correct?

A.

The content in No. 2 must be configured.

B.

In addition to this page configuration, you also need to enable the firewall and sandbox linkage, otherwise the page configuration is invalid

C.

The content in No. 4 must be configured.

D.

After the configuration is completed, you need to submit the configuration to take effect.

The following is the 802.1X access control switch configuration:

[S5720]dot1x authentication-method eap

[S5720-GigabitEthernet0/0/1] port link-type access

[S5720-GigabitEthemet0/0/1] port default vlan 11

[S5720-GigabitEthernet0/0/1] authentication dot1x

Assuming that GE0/0/1 is connected to user 1 and user 2 through the HUB, which of the following options is correct?

A.

After user 1 is authenticated, user 2 can access network resources without authentication

B.

User 1 and User 2 must be individually authenticated before they can access network resources

C.

GE0/0/1 does not need to enable dot1X

D.

Neither user 1 nor user 2 can pass the authentication and access network resources.

Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)

A.

Local upgrade

B.

Manual upgrade

C.

Online upgrade

D.

Automatic upgrade

For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom &age=20, which option is path?

A.

htttp://www.abcd. com:8080/news/education. aspx

B.

htttp://www.abcd. com:8080,te

C.

/news/education. aspx

D.

/news/education. aspx?name=tom&age=20

When using local guest account authentication, usually use(Portal The authentication method pushes the authentication page to the visitor. Before the user is authenticated, when the admission control device receives the HTTP The requested resource is not Portal Server authentication URL When, how to deal with the access control equipment.

A.

Discard message

B.

URL Address redirected to Portal Authentication page

C.

Direct travel

D.

Send authentication information to authentication server

URL filtering technology can perform URL access control on users according to different time objects and address objects to achieve precise management of users.

The purpose of the Internet behavior.

A.

True

B.

False

The service free mobility function of the Agile Controller can guide the flow to the security center for processing according to the service, improving the utilization of physical equipment.

A.

True

B.

False