Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Hot Vendors

H12-723 Huawei Certified ICT Professional - Constructing Terminal Security System Questions and Answers

Questions 4

In order to increase AP The security can be AC Going online AP Perform authentication. Currently Huawei AC What are the supported authentication methods? (Multiple choice)

Options:

A.

MAC Certification

B.

Password authentication

C.

Not certified:

D.

SN Certification

Buy Now
Questions 5

Regarding the file source set in the software management, which of the following descriptions is correct?

Options:

A.

When the file source is an internal data source, when distributing software, the business manager will only send the path of the data source of the software to be distributed to Any Office

B.

When the file source is an external data source, Any 0fce will obtain the software to be distributed.

C.

External data sources cannot distribute files from FTP-type file servers.

D.

The Microsoft Windows file sharing server uses the UNC (Universal Naming Conversion) path (beginning with "\\") to provide waiting. The path to distribute the software.

Buy Now
Questions 6

An enterprise has a large number of mobile office employees, and a mobile office system needs to be deployed to manage the employees. The number of employees in this enterprise exceeds 2000 People, and the employees’ working areas are distributed all over the country. In order to facilitate management, which deployment method is adopted?

Options:

A.

Centralized deployment

B.

Distributed deployment

C.

Hierarchical deployment

D.

Both centralized deployment and distributed deployment are possible

Buy Now
Questions 7

In the visitor reception hall of a company, there are many temporary terminal users, and the administrator hopes that users do not need to provide any account numbers and passwords. access Internet. Which of the following authentication methods can be used for access?

Options:

A.

Local account authentication

B.

Anonymous authentication

C.

AD Account Verification

D.

MAC Certification

Buy Now
Questions 8

URL filtering configure exact match www.test.com/news field, then not meet the URL of the filtering strategy include:

Options:

A.

https://www.test.com/news

B.

www.test.com/news/

C.

WWW.TEST.COM/news

D.

www.test.com/news.aspx

Buy Now
Questions 9

Visitors can access the network through their registered account. Which of the following is not an account approval method?

Options:

A.

Exemption from approval

B.

Administrator approval

C.

Receptionist approval

D.

Self-approved by visitors

Buy Now
Questions 10

In Portal authentication, which of the following parameters must be configured on the switch? (Multiple choice)

Options:

A.

Portal server IP

B.

Portal page URL

C.

shared-key

D.

Portal Protocol version

Buy Now
Questions 11

Agile Controller-Campus The system architecture belongs to C/S Architecture.

Options:

A.

right

B.

wrong

Buy Now
Questions 12

Deploying on Windows platform, using SQL Server database About the HA function of Agile Cotoller-Campus, which of the following descriptions Is it correct? (multiple choice)

Options:

A.

Deployment Management Center MC Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.

B.

Deploy Business Manager SM Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.

C.

Deploy business controller 3SC Time, support HA, Provide a backup solution in resource pool mode, which needs to be deployed N+1 indivual SC

D.

Deploy the database DB Time, support HA use SQL Server Database mirroring technology requires the deployment of master DB+Mirroring DB+witness DB.

Buy Now
Questions 13

IPS signature set priorities cannot be adjusted.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

After opening IP strategy, found part of the business fails, what are the possible reasons? (Choose 2 answers)

Options:

A.

message through the firewall only one direction

B.

the same message repeatedly through the firewall

C.

IP omission

D.

heavy traffic cause Bypass features enabled

Buy Now
Questions 15

The service free mobility function of the Agile Controller can guide the flow to the security center for processing according to the service, improving the utilization of physical equipment.

Options:

A.

right

B.

wrong

Buy Now
Questions 16

According to different reliability requirements, centralized networking can provide different reliability networking solutions. Regarding these solutions, which of the following descriptions are correct? (Multiple choice)

Options:

A.

Basic networking includes deploying one SM Server, one SC Server, one DB and a AE server.

B.

AE In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup SC server.

C.

SC In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup SM server.

D.

DB In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup DB..

Buy Now
Questions 17

WEB filtering technology is a kind of in-depth testing for WEB loophole, WEB classification and access control security management technology on the Internet.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

BY00 The products and textiles provided by the history solution program cover the entire terminal network\Application and management and other fields/include: Serialization BC Equipment, paperless network system network access support, VPN Gateway, terminal security customer ladder software, authentication system, mobile device management(MDN),move eSpace UC.

Options:

A.

right

B.

wrong

Buy Now
Questions 19

In the terminal security management, the black and white list mode is used to check the terminal host software installation status. Which of the following situations is a compliant behavior?

Options:

A.

The terminal host does not install the software in the whitelist, nor the software in the blacklist.

B.

The terminal host installs all the software in the whitelist, but does not install the software in the blacklist.

C.

The terminal host installs part of the software in the whitelist, but does not install the software in the blacklist.

D.

The terminal host installs all the software in the whitelist, and also installs some of the software in the blacklist.

Buy Now
Questions 20

Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?

Options:

A.

Different places can have different security policies.

B.

The location has nothing to do with safety.

C.

There can only be one place in the company.

D.

Place and location have nothing to do.

Buy Now
Questions 21

When the account assigned by the administrator for the guest is connected to the network, the audit action that the administrator can perform on the guest does not include which of the following options?

Options:

A.

Visitor online and offline records

B.

Force users to go offline

C.

Account deactivation 1 reset Password

D.

Send a warning message to the user

Buy Now
Questions 22

When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?

Options:

A.

Deploy the main DB

B.

Deploy image DBO

C.

Deploy witness DB

D.

Deploy MC and SM dual machine backup

Buy Now
Questions 23

In the campus network, employees can use 802.1X, Portal,MAC Address or SACG Way to access. Use different access methods according to different needs to achieve the purpose of user access control.

Options:

A.

right

B.

wrong

Buy Now
Questions 24

According to the user’s access5W1H Conditions determine access rights andQoS Strategy for5W1Ho[Which of the following descriptions are correct? (Multiple choice)

Options:

A.

WhoTo determine the ownership of the access device(Company standard,BYOD Wait)

B.

WhoseTo determine the identity of the access person(member I, Visitors, etc.)

C.

How Determine the access method(Wired, wireless, etc.)

D.

WhatTo determine the access device(PC,iOS Wait)

Buy Now
Questions 25

The greater Virus Scan rating value, the higher the virus detection rate, but the smaller the probability of false positives.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

The AD/LDAP account can be synchronized to the Agile Controller-Campus or not to the Agile Controller-Campus. Synchronize.

The Agile Controller-Campus can only be authorized by user group. If it is not synchronized to the Agile Controller-Campus, it can be fine-tuned based on the account.

Authorization

Options:

A.

right

B.

wrong

Buy Now
Questions 27

Which of the following description is incorrect against server loophole security threats ?

Options:

A.

worms using application software loophole to spread wantonly, consume network bandwidth and destroy important data.

B.

hackers, malicious employee use loophole to attack or invade enterprise servers, business secrets were tampered, damaged and theft .

C.

As long as the system software update in time for system loophole problems can be effectively solved.

D.

The Internet has made application software loophole to spread rapidly, making loophole easier to become targets of attack.

Buy Now
Questions 28

Regarding the policy for checking account security, which of the following descriptions are correct? (Multiple choice)

Options:

A.

You can check whether there is a weak password.

B.

You can check whether the account has joined a specific group.

C.

It cannot be repaired automatically._

D.

It is not possible to check whether the password length meets the requirements.

Buy Now
Questions 29

The following is the 802.1X access control switch configuration:

[S5720]dot1x authentication-method eap

[S5720-GigabitEthernet0/0/1] port link-type access

[S5720-GigabitEthemet0/0/1] port default vlan 11

[S5720-GigabitEthernet0/0/1] authentication dot1x

Assuming that GE0/0/1 is connected to user 1 and user 2 through the HUB, which of the following options is correct?

Options:

A.

After user 1 is authenticated, user 2 can access network resources without authentication

B.

User 1 and User 2 must be individually authenticated before they can access network resources

C.

GE0/0/1 does not need to enable dot1X

D.

Neither user 1 nor user 2 can pass the authentication and access network resources.

Buy Now
Questions 30

Install Agile Controller-Campus Which of the following steps do not need to be completed before?

Options:

A.

Install the operating system

B.

Install the database

C.

Install antivirus software

D.

Import License

Buy Now
Exam Code: H12-723
Exam Name: Huawei Certified ICT Professional - Constructing Terminal Security System
Last Update: Nov 17, 2024
Questions: 201

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now H12-723 testing engine

PDF (Q&A)

$35  $99.99
buy now H12-723 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Nov 2024