ExamGecko
Home / Huawei / H12-724 / List of questions
Ask Question

Huawei H12-724 Practice Test - Questions Answers, Page 21

Add to Whishlist

List of questions

Question 201

Report Export Collapse

About in WLAN User isolation technology is used in the networking environment. Which of the following statements is wrong?

User isolation between groups means that users in different groups cannot communicate, but internal users in the same group can communicate
User isolation between groups means that users in different groups cannot communicate, but internal users in the same group can communicate
Isolation within a user group means that users within the same group cannot communicate with each other.
Isolation within a user group means that users within the same group cannot communicate with each other.
The user isolation function is related to the same AP Layer 2 packets between all wireless users on the Internet cannot be forwarded to each other
The user isolation function is related to the same AP Layer 2 packets between all wireless users on the Internet cannot be forwarded to each other
Intra-group isolation and inter-group isolation cannot be used at the same time
Intra-group isolation and inter-group isolation cannot be used at the same time
Suggested answer: D
asked 18/09/2024
Xiaoyi Wu
45 questions

Question 202

Report Export Collapse

When using local guest account authentication, usually use(Portal The authentication method pushes the authentication page to the visitor. Before the user is authenticated, when the admission control device receives the HTTP The requested resource is not Portal Server authentication URL When, how to deal with the access control equipment.

Discard message
Discard message
URL Address redirected to Portal Authentication page
URL Address redirected to Portal Authentication page
Direct travel
Direct travel
Send authentication information to authentication server
Send authentication information to authentication server
Suggested answer: B
asked 18/09/2024
David Guest
47 questions

Question 203

Report Export Collapse

The administrator issues notices to users in the form of announcements, such as the latest software and patch installation notices. Which of the following options of the announcement is incorrect?

Announcements can be issued by the security department
Announcements can be issued by the security department
The terminal must have a proxy client installed to receive announcements.
The terminal must have a proxy client installed to receive announcements.
If the system issues an announcement and the proxy client is not online, the announcement information will not be received after going online.
If the system issues an announcement and the proxy client is not online, the announcement information will not be received after going online.
Announcements can be issued by account.
Announcements can be issued by account.
Suggested answer: C
asked 18/09/2024
Eduardo Cunha
36 questions

Question 204

Report Export Collapse

When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?

When adding accounts individually, you can choose to create them individually.
When adding accounts individually, you can choose to create them individually.
If there are a lot of users, you can choose to create in batches.
If there are a lot of users, you can choose to create in batches.
If there are many users, you can choose database synchronization
If there are many users, you can choose database synchronization
In order to facilitate management and improve user experience, self-registration can be used.
In order to facilitate management and improve user experience, self-registration can be used.
Suggested answer: C
asked 18/09/2024
Paula Castanheira
43 questions

Question 205

Report Export Collapse

On WIDS functional WLAN Regarding the judgment of illegal devices in the network, which of the following statements are correct? (Multiple choice)

all Ad-hoc The device will be directly judged as an illegal device
all Ad-hoc The device will be directly judged as an illegal device
Not this AC Access AP Is illegal AP
Not this AC Access AP Is illegal AP
Not this AC Access STA Is illegal STA
Not this AC Access STA Is illegal STA
Not this AC Access STA,Also need to check access AP Does it contain law
Not this AC Access STA,Also need to check access AP Does it contain law
Suggested answer: A, D
asked 18/09/2024
Steve Marechal
42 questions

Question 206

Report Export Collapse

Wired 802.1X During authentication, if the access control equipment is deployed at the Jiangju layer, this deployment method has the characteristics of high security performance, multiple management equipment, and complex management.

True
True
False
False
Suggested answer: B
asked 18/09/2024
Mark Anthony Mondonedo
38 questions

Question 207

Report Export Collapse

Which of the following options is for Portal The description of the role of each role in the authentication system is correct?

The client is Any 0fice software.
The client is Any 0fice software.
Portal The role of the server is to receive client authentication requests, provide free portal services and authentication interfaces, and exchange client authentication information with access devices.
Portal The role of the server is to receive client authentication requests, provide free portal services and authentication interfaces, and exchange client authentication information with access devices.
RADIUS The role of the server is to authenticate all the users in the network segment HTTPRequests are redirected to Portal server.
RADIUS The role of the server is to authenticate all the users in the network segment HTTPRequests are redirected to Portal server.
The role of admission control equipment is to complete the authentication, authorization and accounting of users.
The role of admission control equipment is to complete the authentication, authorization and accounting of users.
Suggested answer: B
asked 18/09/2024
Angad Singh
39 questions

Question 208

Report Export Collapse

Which of the following options are relevant to MAC Certification and MAC The description of bypass authentication is correct? (Multiple choice)

MAC Certification is based on MAC The address is an authentication method that controls the user's network access authority. It does not require the user to install any client software.
MAC Certification is based on MAC The address is an authentication method that controls the user's network access authority. It does not require the user to install any client software.
MAC Bypass authentication is first performed on the devices that are connected to the authentication 802 1X Certification;If the device is 802. 1X No response from authentication, re-use MAC The authentication method verifies the legitimacy of the device.
MAC Bypass authentication is first performed on the devices that are connected to the authentication 802 1X Certification;If the device is 802. 1X No response from authentication, re-use MAC The authentication method verifies the legitimacy of the device.
MAC During the authentication process, the user is required to manually enter the user name or password.
MAC During the authentication process, the user is required to manually enter the user name or password.
MAC The bypass authentication process does not MAC The address is used as the user name and password to automatically access the network.
MAC The bypass authentication process does not MAC The address is used as the user name and password to automatically access the network.
Suggested answer: A, B
asked 18/09/2024
Trey Contello
44 questions

Question 209

Report Export Collapse

About the hardware SACG Certification deployment scenarios, which of the following descriptions are correct? (Multiple choice)

SACG Authentication is generally used in scenarios where a stable network performs wired admission control.
SACG Authentication is generally used in scenarios where a stable network performs wired admission control.
SACG Authentication is generally used in scenarios where new networks are used for wireless admission control.
SACG Authentication is generally used in scenarios where new networks are used for wireless admission control.
SACG It is generally deployed in a bypass mode without changing the original network topology.
SACG It is generally deployed in a bypass mode without changing the original network topology.
SACG Essentially through 802.1X Technology controls access users.
SACG Essentially through 802.1X Technology controls access users.
Suggested answer: A, C
asked 18/09/2024
Cynthia Gutknecht
48 questions

Question 210

Report Export Collapse

Traditional network single--The strategy is difficult to cope with the current complex situations such as diversified users, diversified locations, diversified terminals, diversified applications, and insecure experience.

True
True
False
False
Suggested answer: A
asked 18/09/2024
chalapathy naidu
44 questions
Total 367 questions
Go to page: of 37
Search

Related questions