Huawei Certified ICT Professional - Constructing Terminal Security System
Last Update May 21, 2024
Total Questions : 201
We are offering FREE H12-723 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H12-723 free exam questions and then go for complete pool of Huawei Certified ICT Professional - Constructing Terminal Security System test questions that will help you more.
In Portal authentication, which of the following parameters must be configured on the switch? (Multiple choice)
Hardware in useSACG At the time of certification,SACG After the configuration is completed, you can seeSACG andAgile Agile Controller-Campus The linkage is successful, but the user authentication fails. This phenomenon may be caused by the following reasons? (Multiple choice)
Visitor management can authorize visitors based on their account number, time, location, terminal type, access method, etc., and can also push personalized pages to visitors based on time, location, and terminal type.
In the terminal security all-round defense system, use PPT-PDCA The model can effectively implement terminal security defense. Which of the following options does not belong to PPT Model?
After opening IP strategy, found part of the business fails, what are the possible reasons? (Choose 2 answers)
User access authentication technology does not include which of the following options?
Which of the following statement is not correct about application and identification of knowledge base upgrade?
In centralized networking, database,SM server,SC server\ AE Servers are centrally installed in the corporate headquarters. This networking method is suitable for companies with a wide geographical distribution of users and a large number of users.
Which of the following options is Agile Controller-Campus middle SC The main function of the component?
The administrator issues notices to users in the form of announcements, such as the latest software and patch installation notices. Which of the following options of the announcement is incorrect?
The AD/LDAP account can be synchronized to the Agile Controller-Campus or not to the Agile Controller-Campus. Synchronize.
The Agile Controller-Campus can only be authorized by user group. If it is not synchronized to the Agile Controller-Campus, it can be fine-tuned based on the account.
Authorization
URL filtering, according to the classification of the remote or local classification, the user can create multiple urls strategy, determines the corresponding processing action in URL strategies, a URL strategy was applied to the domain, which can realize the corresponding URL filtering.
Which of the following options is about SACG The description of the online process is wrong?
Security authentication is mainly achieved through security policies. The terminal host support management for the security check of monthly users is mainly realized by loose check policies. End user behavior management is mainly realized by monitoring policies. If users need to formulate policies according to their own wishes, they can use them. Custom strategy.
Regarding the role of each role in the Portal authentication framework, which of the following descriptions are correct? (multiple choice)
Portal authentication on the Agile Controller-Campus has been configured and is correct.
Configure the following commands on the access control switch:
[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255
Which of the following options are correct? (multiple choice)
Regarding the description of the account blacklist, which of the following options is wrong?
In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?
URL filtering configure exact match www.test.com/news field, then not meet the URL of the filtering strategy include:
Use the command on the switch to view the status of free mobility deployment, the command is as follows:
For the above command, which of the following descriptions is correct?
When configuring the antivirus software policy, if you set"The required antivirus software violation level is not installed or running"for"generally"And check"out Now serious violation of the rules prohibits access to the network"Options. When the user uses Any office Certify, The certification is passed, but the result of the security check Can the user access the network when the virus software is not turned on?
Regarding the definition of WIPS/WIDS, which of the following statements is correct?
Which of the following options is not included in the mobile terminal life cycle?
In a centralized networking, the database, SM server, SC server, and AE server are all centrally installed in the corporate headquarters. This networking method is suitable. It is used for enterprises with a wide geographical distribution of users and a large number of users.
An account can belong to multiple roles, that is, a user may hold multiple positions.
The terminal host access control function does not take effect, the following is SACG View information on:
Advanced ACL 3099 ,25 rules,not bingding with vpn-instance Ad's step is 1
rule 1000 permit ip (1280 times matched)
rule 1001 permit ip destination 172.18.11.2210 (581 times matched)
rule 1002 permit ip destination 172:18.11.2230 (77 times matched)
rule 1003 permit ip destination 172.19.0.0 0.0 255.255 (355 Book times matched)
rule 1004 deny ip (507759 times matched)
Which of the following statements is correct?
Which of the following cybersecurity threats exist only in WLAN In the network?