Pass the Huawei HCIP-Security H12-723 Questions and answers with CertsForce

Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following options are correct for the description of visitor management? (Multiple choice)

Options:

A.

Visitor registration account can be configured to be exempt from approval


B.

Guest login can only be configured as Web Way of webpage


C.

Anonymous account authentication cannot be performed on the guest authentication page


D.

Visitor account approval information can be notified to visitors via SMS


Questions # 2:

Regarding asset management, which of the following descriptions is wrong?

Options:

A.

Asset management can register assets automatically or manually.


B.

Enable the automatic asset registration mode, the asset registration process does not require end users to participate.


C.

Automatic registration of assets is suitable for situations where the asset number is automatically maintained by the business manager.


D.

Manually registering assets means that the administrator I Way to create an asset record on the business manager, and put the asset number in Any Office Enter it to complete the asset registration

process.


Questions # 3:

URL filtering, remote classification list provided and maintained by a third-party classification servers, devices can be synchronous updated automatically or manually from third-party classification servers.

Options:

A.

TRUE


B.

FALSE


Questions # 4:

A policy template is a collection of several policies. In order to audit the security status of different terminal hosts and the behavior of end users, the administrator needs to customize.

The same policy template is used to protect and manage terminal hosts. Regarding the policy template, which of the following option descriptions are correct? (multiple choice)

Options:

A.

When configuring the policy template, you can inherit the parent template and modify the parent template policy


B.

Only the strategy in the strategy template can be used, and the administrator cannot customize the strategy.


C.

You can assign a policy template to a certain network segment.


D.

If different policy templates are applied to departments and accounts, the policy template assigned to the highest priority will take effect. The priority relationship of the number is: account>department


Questions # 5:

About WEB URL filtering technology audit function, which of the following description is correct? (Choose 3 answers)

Options:

A.

URL audit function is used to record the user's HTTP Internet behavior as the basis for the audit.


B.

The user can configure the web type to be audited, WEB types to distinguish with file extensions, including html, jsp, aspx, etc.


C.

can audit user HTTP access in the specific content of the Post, as a user Internet censorship


D.

internal users access to the specified type of WEB resource, the firewall will be logged and sent to log server.


Questions # 6:

Import the user information of the AD server on the Agile Controller-Campus to realize the user's access authentication. If the user is in the Agile.

The user information is not found on the Controller-Campus. Which of the following actions will be performed in the next step?

Options:

A.

Straight forward to return authentication failure information.


B.

Discard user information.


C.

User 91 Information sent to AD The server performs verification.


D.

Synchronize the database again.


Questions # 7:

Which of the following options is for Portal The statement of the gateway access process is correct?

Options:

A.

Portal gateway initiates Radius Challenge request message, including user name and password information


B.

The ACL issued by the server to the access gateway is carried in the Portal protocol message


C.

Issue policies while performing identity authentication


D.

The Portal server needs to pass the security check result to the access gateway device


Questions # 8:

Webmail filter support Intranet users receive mail filtering.

Options:

A.

TRUE


B.

FALSE


Questions # 9:

Which of the following series of devices does not support the function of accompanying business?

Options:

A.

S5720HI Series Switch:


B.

AR Series router


C.

USG6000 Series firewall


D.

SVN5600 series


Questions # 10:

In enterprises where terminal host access control management is relatively strict, administrators hope to bind terminal hosts and accounts to prevent terminal users from accessing the controlled network from unauthorized terminal hosts at will. Regarding the description of binding the terminal host and account, which of the following is correct?

Options:

A.

exist Any Office When logging in with an account for the first time, the terminal host is automatically bound to the current account, but the automatic binding process requires administrator approval


B.

When other accounts need to be authenticated on the bound terminal host, there is no need to find the asset owner who is bound for the first time to authorize themselves.


C.

Binding terminal hosts and accounts is only applicable to terminal users through Any Office Scenarios for authentication, Not applicable Web Agent Plugins and Web The scenario where the client authenticates.


D.

There are only consoles in the account binding terminal host, which cannot be configured by the administrator.


Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions