Pass the Huawei HCIP-Security H12-723 Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

Web Standards that come with the client and operating system 8021 The instrument client only has the function of identity authentication: It does not support the execution of inspection strategies and monitoring strategies. Any Office The client supports all inspection strategies and monitoring strategies.

Options:

A.

right


B.

wrong


Expert Solution
Questions # 42:

In a WLAN network, intra-group isolation and inter-group isolation can be used at the same time.

Options:

A.

right


B.

wrong


Expert Solution
Questions # 43:

Security authentication is mainly achieved through security policies. The terminal host support management for the security check of monthly users is mainly realized by loose check policies. End user behavior management is mainly realized by monitoring policies. If users need to formulate policies according to their own wishes, they can use them. Custom strategy.

Options:

A.

right


B.

wrong


Expert Solution
Questions # 44:

Which of the following behaviors IPS can not detect?

Options:

A.

Virus


B.

Worm


C.

Spam


D.

DOS


Expert Solution
Questions # 45:

Regarding the trigger mechanism of 802.1X authentication, which of the following descriptions is correct? (multiple choice)

Options:

A.

802.1X Authentication can only be initiated by the client.


B.

802.1X Certification can only be done by certified equipment(like 802.1X switch)Initiate


C.

8021X The client can trigger authentication through multicast or broadcast.


D.

The authentication equipment department triggers authentication through multicast or unicast.


Expert Solution
Questions # 46:

URL filtering configure exact match www.test.com/news field, then not meet the URL of the filtering strategy include:

Options:

A.

http://www.test.com/news


B.

www.test.com/news/


C.

WWW.TEST.COM/news


D.

www.test.com/news.aspx


Expert Solution
Questions # 47:

The access control server is the implementer of the corporate security policy, responsible for implementing the corresponding access control in accordance with the security policy formulated by the customer's network(Allow, deny, leave or restrict).

Options:

A.

right


B.

wrong


Expert Solution
Questions # 48:

Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?

Options:

A.

Different places can have different security policies.


B.

The location has nothing to do with safety.


C.

There can only be one place in the company.


D.

Place and location have nothing to do.


Expert Solution
Questions # 49:

In the terminal security management, the black and white list mode is used to check the terminal host software installation status. Which of the following situations is a compliant behavior?

Options:

A.

The terminal host does not install the software in the whitelist, nor the software in the blacklist.


B.

The terminal host installs all the software in the whitelist, but does not install the software in the blacklist.


C.

The terminal host installs part of the software in the whitelist, but does not install the software in the blacklist.


D.

The terminal host installs all the software in the whitelist, and also installs some of the software in the blacklist.


Expert Solution
Questions # 50:

Regarding patch management and Windows patch checking strategies, which of the following descriptions is wrong?

Options:

A.

Patch management and Windows The patch check strategy can check whether the terminal host has installed the specified Windows Make system patches.


B.

Windows Patch check strategy focuses on checking whether the terminal host is installed Windows Operating system patches.


C.

When the terminal host does not install the specified Windows When making a system patch, according to Windows The patch check policy prohibits terminal hosts from accessing the controlled network.


D.

Patch management focuses on checking whether the terminal host has installed the specified patch,Perform access control on the terminal host.


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions