Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions
Questions # 61:

In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.

"Hand in" to activate.

Options:

A.

True


B.

False


Expert Solution
Questions # 62:

Agile Controller-Campus The system can manage the software installed on the terminal, define the black and white list of software, and assist the terminal to install necessary software and uninstall the software that is not allowed to be installed by linking with the access control equipment,Regarding the definition of black and white lists, which of the following statements is correct?

Options:

A.

Check for prohibited software licenses and sub-licensed software


B.

Check for prohibited software


C.

Check for prohibited software and software that must be installed


D.

Check the software that must be installed


Expert Solution
Questions # 63:

Regarding the description of the ACL used in the linkage between SACG equipment and the TSM system, which of the following statements is correct!?

Options:

A.

default ACL The rule group number can be arbitrarily specified.


B.

default ACL The rule group number can only be 3999.


C.

due to SACG Need to use ACL3099-3999 To pick TSM The rules issued by the system, so in the configuration TSM Before linkage, you need to ensure these ACL Not referenced by other functions.


D.

The original group number is 3099-3999 of ACL Even if it is occupied, it can be successfully activated TSM Linkage.


Expert Solution
Questions # 64:

Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment

Anti-Virus, IPS, spam detection and other equipment.

Options:

A.

True

155955cc-666171a2-20fac832-0c042c0414


B.

False


Expert Solution
Questions # 65:

SACG Inquire right-manager The information is as follows, which options are correct? (Multiple choice)

Options:

A.

SACG and IP Address is 2.1.1.1 The server linkage is unsuccessful.


B.

SACG The linkage with the controller is successful.


C.

main controller IP address is 1.1.1.2.


D.

main controller IP address is 2.1.1.1.


Expert Solution
Questions # 66:

The use of the 802.1X authentication scheme generally requires the terminal to install specific client software. For large-scale deployment of client software, the methods that can be taken. What are the cases? (multiple choices)

Options:

A.

Enable Guest VLAN so that users can obtain the installation package in Guest VLAN


B.

Configure Free-rule and web push functions on the switch to push the installation package to users.


C.

Copy the installation packages to each other via U disk.


D.

Installed by the administrator for each user.


Expert Solution
Questions # 67:

The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.

Signs: The workflow for the WAF tamper-proof module has the following steps:.

① WAF uses the pages in the cache to return to the client;

②WAF compares the watermark of the server page content with the page content in the cache

③Store the content of the page in the cache after learning

④ When the user accesses the Web page, the WAF obtains the page content of the server

⑤WAF starts the learning mode to learn the page content of the user's visit to the website;

For the ordering of these steps, which of the following options is correct?

Options:

A.

③④②⑤①


B.

⑤①②④③


C.

②④①⑤③


D.

⑤③④②①


Expert Solution
Questions # 68:

Sort all services according to user group and account: By the end IP The address range is time-sharing, if it is a user group, a small terminal with an account IP Address range allocation for the same business(Chen Gongji outside business) I The business assigned to the one with the highest priority will take effect.

Which of the following is correct regarding the order of priority?

Options:

A.

account>user group>terminal IP Address range


B.

By the end P Address range>account number>user group


C.

account>Terminal protection address range>user group


D.

user group>terminal P Address range>Account


Expert Solution
Questions # 69:

When configuring the URL filtering configuration file, www.bt.com is configured in the URL blacklist-item: At the same time, set it in the custom URL category.

A URL is set as bt.com, and the action of customizing URL classification is a warning. Regarding the above configuration, which of the following statements are correct? (More

select)

Options:

A.

Users can visit www.videobt.com website.


B.

The user can visit the www.bt.com website, but the administrator will receive a warning message.


C.

User cannot access all the sites ending with bt com.


D.

When users visit www.bt. com, they will be blocked.


Expert Solution
Questions # 70:

Which of the following elements does PDCA include? (Choose 3 answers)

Options:

A.

Plan


B.

Implementation


C.

termination


D.

Monitoring


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions