Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions
Questions # 11:

Regarding WLAN, which of the following descriptions is correct?

Options:

A.

WLAN Is to adopt 80211 Technical WiFi


B.

WLAN There are two basic architectures: FAT AP with AC+FIT AP


C.

AC+FATAP The architecture is suitable for medium and large use scenarios


D.

AC+FITAP Autonomous network architecture


Expert Solution
Questions # 12:

Regarding traditional firewalls, which of the following statements are correct? (multiple choice)

Options:

A.

Lack of effective protection against application layer threats.


B.

It cannot effectively resist the spread of viruses from the Internet to the intranet.


C.

Ability to quickly adapt to changes in threats.


D.

Unable to accurately control various applications, such as P2P, online games, etc. .


Expert Solution
Questions # 13:

Guest management is Agile Controller-Campus Important function of, regarding visitor management, which of the following statements are correct? (Multiple choice)

Options:

A.

Visitors can use their mobile phone number to quickly register an account


B.

The administrator can assign different permissions to each visitor


C.

Reception staff cannot create guest accounts


D.

There is a violation of the guest account, and the administrator cannot retrospectively


Expert Solution
Questions # 14:

Which of the following is the correct configuration idea for the anti-virus strategy?

1. Load the feature library

2. Configure security policy and reference AV Profile

3. Apply and activate the license

4. Configure AV Profile

5. Submit

Options:

A.

3->1->4->2->5


B.

3->2->4->1->5


C.

3->2->1->4->5


D.

3->1->2->4->5


Expert Solution
Questions # 15:

Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?

Options:

A.

Directly discard data sent by devices that do not comply with regulations


B.

Certification of non-compliant equipment.


C.

Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.


D.

Send alarm information to notify the administrator to deal with it.


Expert Solution
Questions # 16:

Portal At the time of certification, pass Web After the browser enters the account password for authentication, it prompts"Authenticating.."The status lasts for a long time before it shows that the authentication is successful. Which of the following reasons may cause this phenomenon?

Options:

A.

Multiple Agile Controller The same terminal IP Address added Portal"Access terminal IP Address list",Some of them Agile Controller The server and the terminal cannot communicate normally.


B.

Portal The template is configured with an incorrect password.


C.

Agile Controller-Campus There are too many authorization rules on the "It takes a lot of time to find 835


D.

Insufficient curtains of the terminal equipment result in a relatively large delay.


Expert Solution
Questions # 17:

With regard to APT attacks, the attacker often lurks for a long time and launches a formal attack on the enterprise at the key point of the incident.

Generally, APT attacks can be summarized into four stages:

1. Collecting Information & Intrusion

2. Long-term lurking & mining

3. Data breach

4. Remote control and penetration

Regarding the order of these four stages, which of the following options is correct?

Options:

A.

2-3-4-1


B.

1-2-4-3


C.

1-4-2-3


D.

2-1-4-3


Expert Solution
Questions # 18:

Huawei WAF products are mainly composed of front-end execution, back-end central systems and databases. Among them, the database mainly stores the front-end detection rules and black

Whitelist and other configuration files.

A True

B. False


Expert Solution
Questions # 19:

Use on access control equipment test-aaa Command test and Radius When the server is connected, the running result shows a timeout, which may be caused by incorrect account or password configuration.

Options:

A.

True


B.

False


Expert Solution
Questions # 20:

The network-based intrusion detection system is mainly used to monitor the information of the critical path of the network in real time, listen to all packets on the network, collect data, and divide

Analyze the suspicious object, which of the following options are its main features? (multiple choices)

Options:

A.

Good concealment, the network-based monitor does not run other applications, does not provide network services, and may not respond to other computers, so

Not vulnerable to attack.


B.

The monitoring speed is fast (the problem can be found in microseconds or seconds, and the host-based DS needs to take an analysis of the audit transcripts in the last few minutes


C.

Need a lot of monitors.


D.

It can detect the source address and destination address, identify whether the address is illegal, and locate the real intruder.


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions