ExamGecko
Home / Huawei / H12-724 / List of questions
Ask Question

Huawei H12-724 Practice Test - Questions Answers, Page 24

List of questions

Question 231

Report
Export
Collapse

Agile Controller-Campus As RADIUS When the server performs authentication, how many ends need to be configured for authentication on the admission control device?

1812
1812
1813
1813
8443
8443
8080
8080
Suggested answer: A
asked 18/09/2024
Jonathan Tang
42 questions

Question 232

Report
Export
Collapse

Which of the following options is not a challenge brought by mobile office?

The mobile office platform is safe and reliable and goes online quickly.
The mobile office platform is safe and reliable and goes online quickly.
Users can access the network safely and quickly.
Users can access the network safely and quickly.
Unified terminal management and fine control.
Unified terminal management and fine control.
Network gateway deployment
Network gateway deployment
Suggested answer: D
asked 18/09/2024
Kevin Intriago
36 questions

Question 233

Report
Export
Collapse

Windows in environment,Agile Controller-Campus After the installation is successful, how to manually start the management center(MC)? (Multiple choice)

Double click on the desktop"Start Server"The shortcut starts.
Double click on the desktop"Start Server"The shortcut starts.
choose"Start>all programs> Huawei> MCServer> StartServer.
choose"Start>all programs> Huawei> MCServer> StartServer.
choose"Start>all programs> Huawei> Agile Controller> Server Startup Config"To manually start the required components.
choose"Start>all programs> Huawei> Agile Controller> Server Startup Config"To manually start the required components.
choose"Start 3 all programs> Huawei> MCServer> Sever Startup Conig",Manually start the required components
choose"Start 3 all programs> Huawei> MCServer> Sever Startup Conig",Manually start the required components
Suggested answer: A, B
asked 18/09/2024
Ahsan Ilyas
32 questions

Question 234

Report
Export
Collapse

When configuring the antivirus software policy, if you set"The required antivirus software violation level is not installed or running"for"generally"And check"out Now serious violation of the rules prohibits access to the network"Options. When the user uses Any office Certify, The certification is passed, but the result of the security check Can the user access the network when the virus software is not turned on?

Can access the network? Can also access network resources.
Can access the network? Can also access network resources.
Cannot access the network.
Cannot access the network.
Can pick up? The network needs to be repaired before you can access network resources.
Can pick up? The network needs to be repaired before you can access network resources.
You can access the network, but you need to re-authenticate to access network resources.
You can access the network, but you need to re-authenticate to access network resources.
Suggested answer: C
asked 18/09/2024
Brian Carlo Hubilla
36 questions

Question 235

Report
Export
Collapse

Which of the following methods can be used to protect enterprise terminal security?

Access control
Access control
Encrypted access
Encrypted access
Business isolation
Business isolation
Audit billing
Audit billing
Suggested answer: A
asked 18/09/2024
Rolf Johannesen
43 questions

Question 236

Report
Export
Collapse

Which of the following options is Agile Controller-Campus middle SC The main function of the component?

As Agile Controller-Campus The management center is responsible for formulating the overall strategy.
As Agile Controller-Campus The management center is responsible for formulating the overall strategy.
As Agile Controller-Campus The management interface is used to configure and monitor the system.
As Agile Controller-Campus The management interface is used to configure and monitor the system.
Integrated with standards RADIUS server,Porta Server, etc., responsible for linking with network access equipment to realize user-based network access control Strategy.
Integrated with standards RADIUS server,Porta Server, etc., responsible for linking with network access equipment to realize user-based network access control Strategy.
As Agile Controller-Campus 'S security assistance server, responsible for iRadar Analysis and calculation of reported security incidents.
As Agile Controller-Campus 'S security assistance server, responsible for iRadar Analysis and calculation of reported security incidents.
Suggested answer: C
asked 18/09/2024
Emma Buchanan
40 questions

Question 237

Report
Export
Collapse

Import the user information of the AD server on the Agile Controller-Campus to realize the user's access authentication. If the user is in the Agile.

The user information is not found on the Controller-Campus. Which of the following actions will be performed in the next step?

Straight forward to return authentication failure information.
Straight forward to return authentication failure information.
Discard user information.
Discard user information.
User 91 Information sent to AD The server performs verification.
User 91 Information sent to AD The server performs verification.
Synchronize the database again.
Synchronize the database again.
Suggested answer: C
asked 18/09/2024
Jennifer Lear
45 questions

Question 238

Report
Export
Collapse

VIP Experience guarantee, from which two aspects are the main guarantees VIP User experience?

(Multiple choice)

bandwidth
bandwidth
Forwarding priority
Forwarding priority
Authority
Authority
Strategy
Strategy
Suggested answer: A, B
asked 18/09/2024
Synathia Imafidon
41 questions

Question 239

Report
Export
Collapse

User access authentication technology does not include which of the following options?

Authentication
Authentication
Isolation repair'
Isolation repair'
Security check
Security check
Access control
Access control
Suggested answer: B
asked 18/09/2024
Verónica Crespo
36 questions

Question 240

Report
Export
Collapse

In the WLAN wireless access scenario, which of the following network security technologies belong to user access security? (Multiple choice)

AP Certification
AP Certification
Link authentication
Link authentication
User access authentication
User access authentication
data encryption
data encryption
Suggested answer: B, C, D
asked 18/09/2024
None None
40 questions
Total 367 questions
Go to page: of 37

Related questions