Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.

Which of the following options belong to the network reliability? (multiple choice)

Options:

A.

Dual machine hot backup


B.

Power supply. 1+1 redundant backup


C.

Hardware Bypass


D.

Link-group


Expert Solution
Questions # 22:

Which of the following options is for Portal The description of the role of each role in the authentication system is correct?

Options:

A.

The client is Any 0fice software.


B.

Portal The role of the server is to receive client authentication requests, provide free portal services and authentication interfaces, and exchange client authentication information with access devices.


C.

RADIUS The role of the server is to authenticate all the users in the network segment HTTP Requests are redirected to Portal server.


D.

The role of admission control equipment is to complete the authentication, authorization and accounting of users.


Expert Solution
Questions # 23:

Agile Controller-Campus Which deployment mode is not supported?

Options:

A.

Centralized deployment


B.

Distributed deployment


C.

Hierarchical deployment


D.

Two-machine deployment


Expert Solution
Questions # 24:

UDP is a connectionless protocol. UDP Flood attacks that change sources and ports will cause performance degradation of network devices that rely on session forwarding.

Even the session table is exhausted, causing the network to be paralyzed. Which of the following options is not a preventive measure for UDP Flood attacks?

Options:

A.

UDP fingerprint learning


B.

Associated defense


C.

current limit


D.

First packet discarded


Expert Solution
Questions # 25:

When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result shows success, but the user cannot Normal access, the possible reason does not include which of the following options?

Options:

A.

The access layer switch does not start EAP Transparent transmission function.


B.

wireless 02K In the scenario, the access control device is not equipped with a security board


C.

AD The service controller is not added in the authentication scenario AD area.


D.

The user account or password is incorrectly configured.


Expert Solution
Questions # 26:

Import the user information of the AD server on the Agile Controller-Campus to realize the user's access authentication. If the user is in the Agile.

The user information is not found on the Controller-Campus. Which of the following actions will be performed in the next step?

Options:

A.

Straight forward to return authentication failure information.


B.

Discard user information.


C.

User 91 Information sent to AD The server performs verification.


D.

Synchronize the database again.


Expert Solution
Questions # 27:

Hardware in useSACG At the time of certification,SACG After the configuration is completed, you can seeSACG andAgile Agile Controller-Campus The linkage is successful, but the user authentication fails. This phenomenon may be caused by the following reasons? (Multiple choice)

Options:

A.

User flow has not passed SACG.


B.

SACG There is no release on the user stream.


C.

SACG There is no closed state detection on it.


D.

Agile Controller-Campus On and SACG Wrong key configuration for linkage


Expert Solution
Questions # 28:

The following figure is a schematic diagram of the detection file of the firewall and the sandbox system linkage.

Question # 28

The Web reputation function is enabled on the firewall, and website A is set as a trusted website and website B is set as a suspicious website.

Which of the following statements is correct

Options:

A.

The files obtained by users from website A and website B will be sent to the inspection node for inspection.


B.

When a user visits website B, although the firewall will extract the file and send it to the detection node, the user can still access normally during the detection process

Site B.


C.

After the detection node detects the suspicious file, it not only informs the firewall in the figure of the result, but also informs other network devices connected to it.


D.

Assuming that website A is an unknown website, the administrator cannot detect the traffic file of this website sC


Expert Solution
Questions # 29:

When configuring the antivirus software policy, if you set"The required antivirus software violation level is not installed or running"for"generally"And check"out Now serious violation of the rules prohibits access to the network"Options. When the user uses Any office Certify, The certification is passed, but the result of the security check Can the user access the network when the virus software is not turned on?

Options:

A.

Can access the network? Can also access network resources.


B.

Cannot access the network.


C.

Can pick up? The network needs to be repaired before you can access network resources.


D.

You can access the network, but you need to re-authenticate to access network resources.


Expert Solution
Questions # 30:

When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?

Options:

A.

Planting malware


B.

Vulnerability attack"


C.

We6 Application Click


D.

Brute force


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions