Pass the Huawei HCIP-Security H12-723_V3.0 Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

The multi-level defense system is mainly reflected in the network level and the system level. Which of the following options are used for security defense at the network level? (Multiple choice)

Options:

A.

software SACG


B.

hardware SACG


C.

802.1X switch


D.

Authentication server


Expert Solution
Questions # 12:

Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.

Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?

Options:

A.

User domain


B.

Network domain


C.

Business domain:


D.

Attack domain


Expert Solution
Questions # 13:

Regarding the trigger mechanism of 802.1X authentication, which of the following descriptions is correct? (multiple choice)

Options:

A.

802.1X Authentication can only be initiated by the client.


B.

802.1X Certification can only be done by certified equipment(like 802.1X switch)Initiate


C.

8021X The client can trigger authentication through multicast or broadcast.


D.

The authentication equipment department triggers authentication through multicast orunicast.


Expert Solution
Questions # 14:

MAC Bypass authentication means that after the terminal is connected to the network, the access control device automatically obtains the terminal MAC Address, which is sent to RADIUS The serverperforms euverification.

Options:

A.

True


B.

False


Expert Solution
Questions # 15:

Which of the following methods can be used to protect enterprise terminal security?

Options:

A.

Access control


B.

Encrypted access


C.

Business isolation


D.

Audit billing


Expert Solution
Questions # 16:

Wired 802.1X During authentication, if the access control equipment is deployed at the Jiangju layer, this deployment method has the characteristics of high security performance, multiple management equipment, and complex management.

Options:

A.

True


B.

False


Expert Solution
Questions # 17:

Regarding the principle of MAC authentication, which of the following descriptions is wrong?

Options:

A.

MAC Certification required Portal Server cooperation.


B.

MACCertification is passed 802.1X Implementation of the agreement.


C.

MAC Authentication requires obtaining the terminal’s MAC The address is stored in AAA server.


D.

NAS Device Configuration MAC After authentication, the terminal’s MAC The address is used asthe username and password.


Expert Solution
Questions # 18:

SACG Inquire right-manager The information is as follows, which options are correct? (Multiple choice)

Options:

A.

SACG and IP Address is 2.1.1.1 The server linkage is unsuccessful.


B.

SACG Thelinkage with the controller is successful.


C.

main controller IP address is 1.1.1.2.


D.

main controller IP address is 2.1.1.1.


Expert Solution
Questions # 19:

When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result showssuccess, but the user cannot Normal access, the possible reason does not include which of the following options?

Options:

A.

The access layer switch does not start EAP Transparent transmission function.


B.

wireless 02K In the scenario, the access control device isnot equipped with a security board


C.

AD The service controller is not added in the authentication scenario AD area.


D.

The user account or password is incorrectly configured.


Expert Solution
Questions # 20:

Which of the following law items is the most blessed for safety? This should be true?

Options:

A.

Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00


B.

Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.


C.

The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.


D.

Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions