Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! H12-723 Huawei Certified ICT Professional - Constructing Terminal Security System is now Stable and With Pass Result

H12-723 Practice Exam Questions and Answers

Huawei Certified ICT Professional - Constructing Terminal Security System

Last Update 5 days ago
Total Questions : 201

H12-723 is stable now with all latest exam questions are added 5 days ago. Just download our Full package and start your journey with Huawei Certified ICT Professional - Constructing Terminal Security System certification. All these Huawei H12-723 practice exam questions are real and verified by our Experts in the related industry fields.

H12-723 PDF

H12-723 PDF (Printable)
$48
$119.99

H12-723 Testing Engine

H12-723 PDF (Printable)
$56
$139.99

H12-723 PDF + Testing Engine

H12-723 PDF (Printable)
$70.8
$176.99
Question # 1

Which of the following options is about Portal The description of the certification process is correct?

Options:

A.  

Portal The certification process is only used in Web Certification

B.  

Server for a terminal Portal Certification will only give one Portal Device sends authentication message

C.  

Switch received Portal Online message, will give Radius Server send Radius Certification request

D.  

Portal The authentication message will not carry the result of the security check

Discussion 0
Question # 2

When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result shows success, but the user cannot Normal access, the possible reason does not include which of the following options?

Options:

A.  

The access layer switch does not start EAP Transparent transmission function.

B.  

wireless 02K In the scenario, the access control device is not equipped with a security board

C.  

AD The service controller is not added in the authentication scenario AD area.

D.  

The user account or password is incorrectly configured.

Discussion 0
Question # 3

Visitor management can authorize visitors based on their account number, time, location, terminal type, access method, etc., and can also push personalized pages to visitors based on time, location, and terminal type.

Options:

A.  

right

B.  

wrong

Discussion 0
Question # 4

According to the user’s access5W1H Conditions determine access rights andQoS Strategy for5W1Ho[Which of the following descriptions are correct? (Multiple choice)

Options:

A.  

WhoTo determine the ownership of the access device(Company standard,BYOD Wait)

B.  

WhoseTo determine the identity of the access person(member I, Visitors, etc.)

C.  

How Determine the access method(Wired, wireless, etc.)

D.  

WhatTo determine the access device(PC,iOS Wait)

Discussion 0
Question # 5

Regarding the description of the security zone in the Agile Controller-Campus, which of the following options are correct? (multiple choice)

Options:

A.  

The user domain is generally composed of various terminal users. The terminals in this area have the characteristics of large numbers, wide distribution, and strong mobility.

B.  

The business domain is a platform for the heavy load of business flows. According to the needs of the enterprise, security technology is used to logically divide the business to realize the security of the network.

C.  

The network domain is the most concerned security protection area of various enterprises, and it carries the important and core information assets of the enterprise.

D.  

The service domain is the area that provides security services for the corporate intranet. This area is generally composed of systems that provide security services such as antivirus servers, patch management servers, and terminal security servers.

Discussion 0
Question # 6

Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)

Options:

A.  

If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.

B.  

If most end users are concentrated on--Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.

C.  

If end users are scattered in different geographical locations, a distributed deployment solution is recommended.

D.  

If end users are scattered in different regions, a centralized deployment solution is recommended.

Discussion 0
Question # 7

The terminal host access control function does not take effect, the following is SACG View information on:

display right- manager role-id rule

Advanced ACL 3099 ,25 rules,not bingding with vpn-instance Ad's step is 1

rule 1000 permit ip (1280 times matched)

rule 1001 permit ip destination 172.18.11.2210 (581 times matched)

rule 1002 permit ip destination 172:18.11.2230 (77 times matched)

rule 1003 permit ip destination 172.19.0.0 0.0 255.255 (355 Book times matched)

rule 1004 deny ip (507759 times matched)

Which of the following statements is correct?

Options:

A.  

172.18.11.221 It is the server of the isolation domain.

B.  

The escape route was opened.

C.  

172.18.11.223 It is a post-domain server.

D.  

The terminal host stream is the default ACL Blocked.

Discussion 0
Question # 8

Regarding CAPWAP encryption, which of the following statements is wrong?

Options:

A.  

CAPWAP The data tunnel can be used DTLS Encrypted.

B.  

DTLS Support two authentication methods:Certificate authentication(out AC,AP Already brought)with PSK Password authentication.

C.  

DTLS Encryption can guarantee AC The issued control messages will not be eavesdropped on.

D.  

Use the certificate method to carry out DTLS Negotiation, the certificate is only used to generate the key, not right AP Perform authentication.

Discussion 0
Question # 9

After the user is successfully authenticated, Agile Controller-Campus Which of the following actions can be performed on the user(Multiple choice)

Options:

A.  

To use Any Office The connected user performs remote assistance.

B.  

Force users to go offline.

C.  

Audit users' online and offline records.

D.  

Disable the mobile certificate account/Disable and assign roles.

Discussion 0
Question # 10

A network adopts 802. 1X To authenticate access users, the access control equipment is deployed at the convergence layer, and after the deployment is completed, it is used on the access control equipment t-aa The command test is successful, but the user cannot access the network. The failure may be caused by the following reasons? (Multiple choice)

Options:

A.  

The aggregation layer device is not configured RADIUS Certification template.

B.  

Agile Controller-Campus The switch is not added on NAS equipment.

C.  

Connect to the terminal on the device to open 802.1X Function.

D.  

The Layer 2 link is used between the access device and the aggregation device, and it is not turned on 802 Instrument transparent transmission function

Discussion 0
Question # 11

Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?

Options:

A.  

Short message

B.  

E-mail

C.  

Web Print

D.  

Voicemail

Discussion 0
Question # 12

The greater Virus Scan rating value, the higher the virus detection rate, but the smaller the probability of false positives.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 13

In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.

The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario of inconsistent traffic back and forth paths, this needs to turn off the session state check function.

Options:

A.  

right

B.  

wrong

Discussion 0
Question # 14

Use on access control equipment test-aaa Command test and Radius When the server is connected, the running result shows a timeout, which may be caused by incorrect account or password configuration.

Options:

A.  

right

B.  

wrong

Discussion 0
Question # 15

Which of the following law items is the most blessed for safety? This should be true?

Options:

A.  

Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00

B.  

Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.

C.  

The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.

D.  

Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.

Discussion 0
Question # 16

In a WLAN network, intra-group isolation and inter-group isolation can be used at the same time.

Options:

A.  

right

B.  

wrong

Discussion 0
Question # 17

A policy template is a collection of several policies. In order to audit the security status of different terminal hosts and the behavior of end users, the administrator needs to customize.

The same policy template is used to protect and manage terminal hosts. Regarding the policy template, which of the following option descriptions are correct? (multiple choice)

Options:

A.  

When configuring the policy template, you can inherit the parent template and modify the parent template policy

B.  

Only the strategy in the strategy template can be used, and the administrator cannot customize the strategy.

C.  

You can assign a policy template to a certain network segment.

D.  

If different policy templates are applied to departments and accounts, the policy template assigned to the highest priority will take effect. The priority relationship of the number is: account>department

Discussion 0
Question # 18

Which of the following equipment is suitable for use MAC Authentication access network?

Options:

A.  

Office Windows System host

B.  

For testing Linux System host

C.  

Mobile client, such as smart phone, etc

D.  

Network printer 232335

Discussion 0
Question # 19

Administrator creates the correct IPS strategy, applied to domain or inter-domain , but found that no matter in the IPS signature set movement is blocking or alarm, when the invasion attack, only produce the

alarm.

What is the reason for this problem?

Options:

A.  

Set IPS work mode in the IPS global parameters for alarm

B.  

did not select the correct domain

C.  

did not configure corresponding IPS strategy

D.  

configure Firewall running mode for Firewall mode

Discussion 0
Question # 20

About WEB URL filtering technology audit function, which of the following description is correct? (Choose 3 answers)

Options:

A.  

URL audit function is used to record the user's HTTP Internet behavior as the basis for the audit.

B.  

The user can configure the web type to be audited, WEB types to distinguish with file extensions, including html, jsp, aspx, etc.

C.  

can audit user HTTP access in the specific content of the Post, as a user Internet censorship

D.  

internal users access to the specified type of WEB resource, the firewall will be logged and sent to log server.

Discussion 0
Question # 21

Wired 802.1X During authentication, if the access control equipment is deployed at the Jiangju layer, this deployment method has the characteristics of high security performance, multiple management equipment, and complex management.

Options:

A.  

right

B.  

wrong

Discussion 0
Question # 22

When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?

Options:

A.  

Deploy the main DB

B.  

Deploy image DBO

C.  

Deploy witness DB

D.  

Deploy MC and SM dual machine backup

Discussion 0
Question # 23

In the park, users frequently enter and leave the wireless signal coverage area due to office needs. If you need to ensure the user's Internet experience, after the user passes an authentication, when he accesses the network again, no important authentication is required:Which of the following authentication methods is recommended?

Options:

A.  

MAC Certification

B.  

82.1 Certification

C.  

Portal Certification

D.  

MAC(prioritized

Discussion 0
Question # 24

Regarding the identity authentication method and authentication type, which of the following descriptions is correct?

Options:

A.  

User passed web The method can support two authentication types: local authentication and digital certificate authentication.

B.  

User passed web Agent The method can support two authentication types: digital certificate authentication and system authentication.

C.  

User passed Agent The method can support three authentication types: local authentication, digital certificate authentication and system authentication.

D.  

User passed web Agent The method can support two authentication types: digital certificate authentication and local authentication.

Discussion 0
Question # 25

Portal page push rules have priority, and the rules with higher priority are matched with the user's authentication information first. If none of the configured rules match, The default rules are used.

Options:

A.  

right

B.  

wrong

Discussion 0
Question # 26

There is a three-layer forwarding device between the authentication client and the admission control device:If at this time Portal The certified three-layer authentication device can also obtain the authentication client's MAC address,So you can use IP Address and MC The address serves as the information to identify the user.

Options:

A.  

right

B.  

wrong

Discussion 0
Question # 27

What do the common virus behavior characteristics include?(select 3 answers)

Options:

A.  

Download and backdoor characteristics

B.  

Information Collection feature

C.  

own hidden feature

D.  

system attacks characteristics

Discussion 0
Question # 28

Mobile smartphone, tablet PC users through Any Office Client and AE Establish IPSec Encrypted tunnel, After passing the certification and compliance check, visit the enterprise business.

Options:

A.  

right

B.  

wrong

Discussion 0
Question # 29

The AD/LDAP account can be synchronized to the Agile Controller-Campus or not to the Agile Controller-Campus. Synchronize.

The Agile Controller-Campus can only be authorized by user group. If it is not synchronized to the Agile Controller-Campus, it can be fine-tuned based on the account.

Authorization

Options:

A.  

right

B.  

wrong

Discussion 0
Question # 30

Configuring WLAN device detection can realize the monitoring of the entire network, but you need to set the working mode of the AP first, which of the following options are.

What is the working mode of AP? (multiple choice)

Options:

A.  

access mode

B.  

Normal mode

C.  

Mixed mode

D.  

Monitoring mode

Discussion 0
Get H12-723 dumps and pass your exam in 24 hours!

Free Exams Sample Questions