Pass the Huawei HCIP-Security H12-723 Questions and answers with CertsForce

Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions
Questions # 51:

WEB filtering technology is a kind of in-depth testing for WEB loophole, WEB classification and access control security management technology on the Internet.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 52:

When the account assigned by the administrator for the guest is connected to the network, the audit action that the administrator can perform on the guest does not include which of the following options?

Options:

A.

Visitor online and offline records


B.

Force users to go offline


C.

Account deactivation 1 reset Password


D.

Send a warning message to the user


Expert Solution
Questions # 53:

According to different reliability requirements, centralized networking can provide different reliability networking solutions. Regarding these solutions, which of the following descriptions are correct? (Multiple choice)

Options:

A.

Basic networking includes deploying one SM Server, one SC Server, one DB and a AE server.


B.

AE In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup SC server.


C.

SC In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup SM server.


D.

DB In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup DB..


Expert Solution
Questions # 54:

IPS custom signature in UTM supports you to set direction and protocol type.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 55:

Which of the following statement is wrong about NIP?

Options:

A.

NIP compare the data packet and application knowledge base, identify specific data flow


B.

NIP support for specific IP network segment, in a specific time period, for strategy processing


C.

NIP using leading hardware architecture, FPGA realization of the application layer acceleration, ESP achieve forward acceleration


D.

NIP Manager supports mail alarm response mode


Expert Solution
Questions # 56:

Portal The second-level authentication method of authentication refers to the direct connection between the client and the access device(Or only layer devices exist in between),The device can learn the user’s MAC Address and can be used IP with MAC Address to identify the user.

Options:

A.

right


B.

wrong


Expert Solution
Questions # 57:

Regarding CAPWAP encryption, which of the following statements is wrong?

Options:

A.

CAPWAP The data tunnel can be used DTLS Encrypted.


B.

DTLS Support two authentication methods:Certificate authentication(out AC,AP Already brought)with PSK Password authentication.


C.

DTLS Encryption can guarantee AC The issued control messages will not be eavesdropped on.


D.

Use the certificate method to carry out DTLS Negotiation, the certificate is only used to generate the key, not right AP Perform authentication.


Expert Solution
Questions # 58:

If you are deploying BYOD When the system is installed, use a stand-alone installation SM, Dual-machine installation SC, Stand-alone hardware deployment AE,Which of the following descriptions are correct? (Multiple choice)

Options:

A.

AE Server priority use)SC server.


B.

Install AE When the server, you need to configure the main and standby SC Server IP address.


C.

If the Lord SC After the server fails,AE The server will use the backup SC server.


D.

host SC After the server is restored,AE Server will not switch back to master SC The server handles the business.


Expert Solution
Questions # 59:

Which of the following options is not included in the mobile terminal life cycle?

Options:

A.

Obtain


B.

deploy


C.

run


D.

Uninstall


Expert Solution
Questions # 60:

User access authentication technology does not include which of the following options?

Options:

A.

Authentication


B.

Isolation repair'


C.

Security check


D.

Access control


Expert Solution
Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions