Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions
Questions # 41:

Portal authentication on the Agile Controller-Campus has been configured and is correct.

Configure the following commands on the access control switch:

[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255

Which of the following options are correct? (multiple choice)

Options:

A.

After the configuration is complete, the switch will automatically release the data flow to access the security controller,No need for manual configuration by the administrator.


B.

This configuration allows users to access network resources before authentication.


C.

After the configuration is complete, the administrator still needs to manually configure the release network segment


D.

Only after the authentication is passed, the terminal can access 10.1.31.78 Host.


Expert Solution
Questions # 42:

Which of the following law items is the most blessed for safety? This should be true?

Options:

A.

Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00


B.

Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.


C.

The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.


D.

Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.


Expert Solution
Questions # 43:

When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result shows success, but the user cannot Normal access, the possible reason does not include which of the following options?

Options:

A.

The access layer switch does not start EAP Transparent transmission function.


B.

wireless 02K In the scenario, the access control device is not equipped with a security board


C.

AD The service controller is not added in the authentication scenario AD area.


D.

The user account or password is incorrectly configured.


Expert Solution
Questions # 44:

Configure the following commands on the Huawei firewall:

[USG] interface G0/0/1

[USG] ip urpf loose allow-defult-route acl 3000

Which of the following options are correct? (multiple choice)

Options:

A.

For loose inspection: if the source address of the packet exists in the FB of the firewall: the packet passes the inspection directly


B.

For the case where the default route is configured, but the parameter allow-defult-route is not configured. As long as the source address of the packet is in the FIB table of the firewall

If it does not exist, the message will be rejected.


C.

For the situation where the default route is configured and the parameter allow-defult-route is matched at the same time, if the source address of the packet is in the FIB table of the firewall

If the packet does not exist in the loose check mode, all packets will pass the URPF check and be forwarded normally.

155955cc-666171a2-20fac832-0c042c0427


D.

For the configuration of the default route, and at the same time matching the parameter allow-defult-route, if the source address of the message is in the FIB table of the firewall

If it does not exist in the l0e check, the packet cannot pass the URPF check.


Expert Solution
Questions # 45:

Which of the following are typical intrusions? "Multiple choice)

Options:

A.

Computer is infected by U disk virus


B.

Abnormal power interruption in the computer room


C.

Tampering with Web pages


D.

Copy/view sensitive data


Expert Solution
Questions # 46:

Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)

Options:

A.

The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.


B.

It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa


C.

Port mirroring needs to be configured on the management center to monitor abnormal traffic.

155955cc-666171a2-20fac832-0c042c0411


D.

The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:


Expert Solution
Questions # 47:

Which of the following options is about SACG The description of the online process is wrong?

Options:

A.

Terminal and Agile Controller-Campus Server communication SSL encryption


B.

Authentication fails, end users can only access resources in the pre-authentication domain


C.

Security check passed,Agile Controller-Campus Server notification SACG Will end user's IP Address switch to isolated domain


D.

Agile Controller-Campus Server gives SACG Carrying domain parameters in the message


Expert Solution
Questions # 48:

For the convenience of visitors, different authentication and master pages can be distributed for different visitors. When configuring the push page strategy, different matching conditions need to be defined, so which of the following options can be used as the limited matching conditions? (Multiple choice)

Options:

A.

Terminal P address


B.

Location information of the access device


C.

Priority of guest accounts


D.

Connected to the network SSID'


Expert Solution
Questions # 49:

Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.

Options:

A.

True


B.

False


Expert Solution
Questions # 50:

Which of the following options is about Portal The description of the certification process is correct?

Options:

A.

Portal The certification process is only used in Web Certification


B.

Server for a terminal Portal Certification will only give one Portal Device sends authentication message


C.

Switch received Portal Online message, will give Radius Server send Radius Certification request


D.

Portal The authentication message will not carry the result of the security check


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions