Pass the Huawei HCIP-Security H12-723 Questions and answers with CertsForce

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

Secure email is Any ffice Solution for corporate office 0A The killer application provided, it provides powerful email business capabilities and rich email strategies. For secure mail, which of the following descriptions are correct? (Multiple choice)

Options:

A.

Through the mail client, you can connect No or Exchange Mail system.


B.

Support automatic mail transmission encryption, transmission encryption method supports a full range of IPSec/TLS protocol.


C.

Online survey of attached documents is not supported.


D.

Support MAP4/SMTP/EAS Send and receive emails with standard protocols such as, and support real-time email push.


Expert Solution
Questions # 12:

The following configuration is in A with B The authentication commands are configured on the two admission control devices. For the analysis of the following configuration commands, which ones are correct? (Multiple choice)

Options:

A.

A What is configured on the device is MAC Bypass authentication


B.

B What is configured on the device is MAC Bypass authentication o


C.

A On the device 2GE1/01 Can access PC Can also access dumb terminal equipment


D.

B On the device GE1/0/1 Can access PC It can also access dumb terminal equipment. Upper


Expert Solution
Questions # 13:

A university user requirements are as follows:

1. The environmental flow is larger, two-way add up to OOOM, UTM deployed in its network node.

2. The intranet is divided into students zones, server zones, etc., users are most concerned about the security of the server area, to avoid all kinds of the threat of attack.

3. At the same time to ban students area some pornographic websites.

In UTM configured Extranet for untrust domain, Intranet for trust domain, how to deploy the UTM strategy? (Select 2 answers)

Options:

A.

can be directly under the global open AV, PS protective function, URL filtering function, then it can be realized


B.

Outbound direction only open AV, IPS protective function for server areas, protected server


C.

inboud direction only open AV, IPS protective function for server areas, protected server


D.

Outbound direction open URL filtering function for the entire campus network, and filtering of part classification website


Expert Solution
Questions # 14:

View on the switch Agile Controller-Campus The policy issued by the server is as follows:

For this strategy, which of the following options are correct? (Multiple choice)

Options:

A.

Common_ user Users can access Internet www H.


B.

VIP Users can access Internet w H.


C.

VIP Can visit Mail Server H.


D.

Common user Users can access Mail_ Sever resource.


Expert Solution
Questions # 15:

SACG Inquire right-manager The information is as follows, which options are correct? (Multiple choice)

Options:

A.

SACG and IP Address is 2.1.1.1 The server linkage is unsuccessful.


B.

SACG The linkage with the controller is successful.


C.

main controller IP address is 1.1.1.2.


D.

main controller IP address is 2.1.1.1.


Expert Solution
Questions # 16:

BY00 The products and textiles provided by the history solution program cover the entire terminal network\Application and management and other fields/include: Serialization BC Equipment, paperless network system network access support, VPN Gateway, terminal security customer ladder software, authentication system, mobile device management(MDN),move eSpace UC.

Options:

A.

right


B.

wrong


Expert Solution
Questions # 17:

In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?

Options:

A.

DHCP


B.

ARP


C.

CAPWAP


D.

802.11MAC


Expert Solution
Questions # 18:

Which of the following options are right 802. 1X The description of the access process is correct? (Multiple choice).

Options:

A.

Through the entire authentication process, the terminal passes EAP The message exchanges information with the server.


B.

Terminal and 802.1X Switch EAP Message interaction,802.1X Switch and server use Radius Message exchange information


C.

802.1X Authentication does not require security policy checks.


D.

use MD5 The algorithm checks the information.


Expert Solution
Questions # 19:

Which of the statement is not correct according to following configuration?

[USG] pattern-group 6t type url

[USG-pattern-group-url-bt] pattern any bt.com

[USG] url-filter policy urlpolicy3

[USG-urlfilter-policy-urlpolicy3] blacklist enable

[USG-urlfilter-policy-urlpolicy3] whitelist enable

[USG-urlfilter-policy-urlpolicy3] blacklist group 6t

[USG] web-filter policy webpolicy3

[USG-web-filter-policy-webpolicy3] policy url-filter urlpolicy3

[USG-policy-interzone-trust-untrust-outbound] policy 3

[USG-policy-interzone-trust-untrust-outbound-3] action permit

[USG-policy-interzone-trust-untrust-outbound-3] policy source range 10.10.10.101 10.10.10.200

[USG-policy-interzone-trust-untrust-outbound-3] policy web-filter webpolicy3

Options:

A.

users of IP address 10.10.10.120 can access bt.com website


B.

users of IP address 10.10.10.199 cannot access bt.com website


C.

users of IP address 10.10.10.100 can access bt.com website


D.

users of IP address 10.10.10.220 can access bt.com website


Expert Solution
Questions # 20:

The AD/LDAP account can be synchronized to the Agile Controller-Campus or not to the Agile Controller-Campus. Synchronize.

The Agile Controller-Campus can only be authorized by user group. If it is not synchronized to the Agile Controller-Campus, it can be fine-tuned based on the account.

Authorization

Options:

A.

right


B.

wrong


Expert Solution
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions