Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
Questions # 1:

SACG query right-manager information as follows, which options are correct? (Select 2 answers)

Question # 1

Options:

A.

SACG and IP address 2.1.1.1 server linkage is not successful


B.

SACG linkage success with controller.


C.

master controller IP address is 1.1.1.2.


D.

master controller IP address is 2.1.1.1.


Questions # 2:

Which of the following equipment is suitable for use MAC Authentication access network?

Options:

A.

Office Windows System host


B.

For testing Linux System host


C.

Mobile client, such as smart phone, etc


D.

Network printer 232335


Questions # 3:

Regarding the sequence of the mail transmission process, which of the following is correct?

1. The sender PC sends the mail to the designated SMTP Server.

2. The sender SMTP Server encapsulates the mail information in an SMTP message and sends it to the receiver SMTP Server according to the destination address of the mail

3. The sender SMTP Server encapsulates the mail information in an SMTP message according to the destination address of the mail and sends it to the receiver POP3/MAP Senver

4. The recipient sends an email.

Options:

A.

1->2->3


B.

1->2->4,


C.

1->3->2


D.

1->4->3


Questions # 4:

Regarding the principle of MAC authentication, which of the following descriptions is wrong?

Options:

A.

MAC Certification required Portal Server cooperation.


B.

MAC Certification is passed 802.1X Implementation of the agreement.


C.

MAC Authentication requires obtaining the terminal’s MAC The address is stored in AAA server.


D.

NAS Device Configuration MAC After authentication, the terminal’s MAC The address is used as the username and password.


Questions # 5:

For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom &age=20, which option is path?

Options:

A.

htttp://www.abcd. com:8080/news/education. aspx


B.

htttp://www.abcd. com:8080,te


C.

/news/education. aspx


D.

/news/education. aspx?name=tom&age=20


Questions # 6:

Which of the following options is for Portal The statement of the gateway access process is correct?

Options:

A.

Portal gateway initiates Radius Challenge request message, including user name and password information


B.

The ACL issued by the server to the access gateway is carried in the Portal protocol message


C.

Issue policies while performing identity authentication


D.

The Portal server needs to pass the security check result to the access gateway device


Questions # 7:

A policy template is a collection of several policies. In order to audit the security status of different terminal hosts and the behavior of end users, the administrator needs to customize.

The same policy template is used to protect and manage terminal hosts. Regarding the policy template, which of the following option descriptions are correct? (multiple choice)

Options:

A.

When configuring the policy template, you can inherit the parent template and modify the parent template policy


B.

Only the strategy in the strategy template can be used, and the administrator cannot customize the strategy.


C.

You can assign a policy template to a certain network segment.


D.

If different policy templates are applied to departments and accounts, the policy template assigned to the highest priority will take effect. The priority relationship of the number is: account>department


Questions # 8:

Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?

Options:

A.

Different places can have different security policies.


B.

The location has nothing to do with safety.


C.

There can only be one place in the company.


D.

Place and location have nothing to do.


Questions # 9:

Which of the following methods can be used to protect enterprise terminal security?

Options:

A.

Access control


B.

Encrypted access


C.

Business isolation


D.

Audit billing


Questions # 10:

Regarding patch management and Windows patch checking strategies, which of the following descriptions is wrong?

Options:

A.

Patch management and Windows The patch check strategy can check whether the terminal host has installed the specified Windows Make system patches.


B.

Windows Patch check strategy focuses on checking whether the terminal host is installed Windows Operating system patches.


C.

When the terminal host does not install the specified Windows When making a system patch, according to Windows The patch check policy prohibits terminal hosts from accessing the controlled network.


D.

Patch management focuses on checking whether the terminal host has installed the specified patch,Perform access control on the terminal host.


Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions