ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











About in WLAN User isolation technology is used in the networking environment. Which of the following statements is wrong?

A.
User isolation between groups means that users in different groups cannot communicate, but internal users in the same group can communicate
A.
User isolation between groups means that users in different groups cannot communicate, but internal users in the same group can communicate
Answers
B.
Isolation within a user group means that users within the same group cannot communicate with each other.
B.
Isolation within a user group means that users within the same group cannot communicate with each other.
Answers
C.
The user isolation function is related to the same AP Layer 2 packets between all wireless users on the Internet cannot be forwarded to each other
C.
The user isolation function is related to the same AP Layer 2 packets between all wireless users on the Internet cannot be forwarded to each other
Answers
D.
Intra-group isolation and inter-group isolation cannot be used at the same time
D.
Intra-group isolation and inter-group isolation cannot be used at the same time
Answers
Suggested answer: D

When using local guest account authentication, usually use(Portal The authentication method pushes the authentication page to the visitor. Before the user is authenticated, when the admission control device receives the HTTP The requested resource is not Portal Server authentication URL When, how to deal with the access control equipment.

A.
Discard message
A.
Discard message
Answers
B.
URL Address redirected to Portal Authentication page
B.
URL Address redirected to Portal Authentication page
Answers
C.
Direct travel
C.
Direct travel
Answers
D.
Send authentication information to authentication server
D.
Send authentication information to authentication server
Answers
Suggested answer: B

The administrator issues notices to users in the form of announcements, such as the latest software and patch installation notices. Which of the following options of the announcement is incorrect?

A.
Announcements can be issued by the security department
A.
Announcements can be issued by the security department
Answers
B.
The terminal must have a proxy client installed to receive announcements.
B.
The terminal must have a proxy client installed to receive announcements.
Answers
C.
If the system issues an announcement and the proxy client is not online, the announcement information will not be received after going online.
C.
If the system issues an announcement and the proxy client is not online, the announcement information will not be received after going online.
Answers
D.
Announcements can be issued by account.
D.
Announcements can be issued by account.
Answers
Suggested answer: C

When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?

A.
When adding accounts individually, you can choose to create them individually.
A.
When adding accounts individually, you can choose to create them individually.
Answers
B.
If there are a lot of users, you can choose to create in batches.
B.
If there are a lot of users, you can choose to create in batches.
Answers
C.
If there are many users, you can choose database synchronization
C.
If there are many users, you can choose database synchronization
Answers
D.
In order to facilitate management and improve user experience, self-registration can be used.
D.
In order to facilitate management and improve user experience, self-registration can be used.
Answers
Suggested answer: C

On WIDS functional WLAN Regarding the judgment of illegal devices in the network, which of the following statements are correct? (Multiple choice)

A.
all Ad-hoc The device will be directly judged as an illegal device
A.
all Ad-hoc The device will be directly judged as an illegal device
Answers
B.
Not this AC Access AP Is illegal AP
B.
Not this AC Access AP Is illegal AP
Answers
C.
Not this AC Access STA Is illegal STA
C.
Not this AC Access STA Is illegal STA
Answers
D.
Not this AC Access STA,Also need to check access AP Does it contain law
D.
Not this AC Access STA,Also need to check access AP Does it contain law
Answers
Suggested answer: A, D

Wired 802.1X During authentication, if the access control equipment is deployed at the Jiangju layer, this deployment method has the characteristics of high security performance, multiple management equipment, and complex management.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which of the following options is for Portal The description of the role of each role in the authentication system is correct?

A.
The client is Any 0fice software.
A.
The client is Any 0fice software.
Answers
B.
Portal The role of the server is to receive client authentication requests, provide free portal services and authentication interfaces, and exchange client authentication information with access devices.
B.
Portal The role of the server is to receive client authentication requests, provide free portal services and authentication interfaces, and exchange client authentication information with access devices.
Answers
C.
RADIUS The role of the server is to authenticate all the users in the network segment HTTPRequests are redirected to Portal server.
C.
RADIUS The role of the server is to authenticate all the users in the network segment HTTPRequests are redirected to Portal server.
Answers
D.
The role of admission control equipment is to complete the authentication, authorization and accounting of users.
D.
The role of admission control equipment is to complete the authentication, authorization and accounting of users.
Answers
Suggested answer: B

Which of the following options are relevant to MAC Certification and MAC The description of bypass authentication is correct? (Multiple choice)

A.
MAC Certification is based on MAC The address is an authentication method that controls the user's network access authority. It does not require the user to install any client software.
A.
MAC Certification is based on MAC The address is an authentication method that controls the user's network access authority. It does not require the user to install any client software.
Answers
B.
MAC Bypass authentication is first performed on the devices that are connected to the authentication 802 1X Certification;If the device is 802. 1X No response from authentication, re-use MAC The authentication method verifies the legitimacy of the device.
B.
MAC Bypass authentication is first performed on the devices that are connected to the authentication 802 1X Certification;If the device is 802. 1X No response from authentication, re-use MAC The authentication method verifies the legitimacy of the device.
Answers
C.
MAC During the authentication process, the user is required to manually enter the user name or password.
C.
MAC During the authentication process, the user is required to manually enter the user name or password.
Answers
D.
MAC The bypass authentication process does not MAC The address is used as the user name and password to automatically access the network.
D.
MAC The bypass authentication process does not MAC The address is used as the user name and password to automatically access the network.
Answers
Suggested answer: A, B

About the hardware SACG Certification deployment scenarios, which of the following descriptions are correct? (Multiple choice)

A.
SACG Authentication is generally used in scenarios where a stable network performs wired admission control.
A.
SACG Authentication is generally used in scenarios where a stable network performs wired admission control.
Answers
B.
SACG Authentication is generally used in scenarios where new networks are used for wireless admission control.
B.
SACG Authentication is generally used in scenarios where new networks are used for wireless admission control.
Answers
C.
SACG It is generally deployed in a bypass mode without changing the original network topology.
C.
SACG It is generally deployed in a bypass mode without changing the original network topology.
Answers
D.
SACG Essentially through 802.1X Technology controls access users.
D.
SACG Essentially through 802.1X Technology controls access users.
Answers
Suggested answer: A, C

Traditional network single--The strategy is difficult to cope with the current complex situations such as diversified users, diversified locations, diversified terminals, diversified applications, and insecure experience.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 367 questions
Go to page: of 37