ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 25

Question list
Search
Search

List of questions

Search

Related questions











Which of the following options are relevant to Any Office The description of the solution content is correct? (Multiple choice)

A.
Provide unified and secure access to enterprise mobile applications on mobile terminals.
A.
Provide unified and secure access to enterprise mobile applications on mobile terminals.
Answers
B.
The tunnel is dedicated and cannot be penetrated by viruses.
B.
The tunnel is dedicated and cannot be penetrated by viruses.
Answers
C.
Applications are quickly integrated and can be extended.
C.
Applications are quickly integrated and can be extended.
Answers
D.
It can be quickly integrated and docked with the enterprise application cloud platform.
D.
It can be quickly integrated and docked with the enterprise application cloud platform.
Answers
Suggested answer: A, B, C, D

MAC Bypass authentication means that after the terminal is connected to the network, the access control device automatically obtains the terminal MAC Address, which is sent to RADIUS The server performs euverification.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

When the account assigned by the administrator for the guest is connected to the network, the audit action that the administrator can perform on the guest does not include which of the following options?

A.
Visitor online and offline records
A.
Visitor online and offline records
Answers
B.
Force users to go offline
B.
Force users to go offline
Answers
C.
Account deactivation 1 reset Password
C.
Account deactivation 1 reset Password
Answers
D.
Send a warning message to the user
D.
Send a warning message to the user
Answers
Suggested answer: D

In the visitor reception hall of a company, there are many temporary terminal users, and the administrator hopes that users do not need to provide any account numbers and passwords. access Internet. Which of the following authentication methods can be used for access?

A.
Local account authentication
A.
Local account authentication
Answers
B.
Anonymous authentication
B.
Anonymous authentication
Answers
C.
AD Account Verification
C.
AD Account Verification
Answers
D.
MAC Certification
D.
MAC Certification
Answers
Suggested answer: B

Agile Controller-Campus The department includes four parts of the management center(MC)Business manager(SM)And business controller(SC)And client network access equipment (NAD)As a component of the solution, it is linked with the service controller to realize user access control and free mobility.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Visitors can access the network through their registered account. Which of the following is not an account approval method?

A.
Exemption from approval
A.
Exemption from approval
Answers
B.
Administrator approval
B.
Administrator approval
Answers
C.
Receptionist approval
C.
Receptionist approval
Answers
D.
Self-approved by visitors
D.
Self-approved by visitors
Answers
Suggested answer: D

Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)

A.
If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.
A.
If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.
Answers
B.
If most end users are concentrated on--Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.
B.
If most end users are concentrated on--Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.
Answers
C.
If end users are scattered in different geographical locations, a distributed deployment solution is recommended.
C.
If end users are scattered in different geographical locations, a distributed deployment solution is recommended.
Answers
D.
If end users are scattered in different regions, a centralized deployment solution is recommended.
D.
If end users are scattered in different regions, a centralized deployment solution is recommended.
Answers
Suggested answer: A, C

Security authentication is mainly achieved through security policies. The terminal host support management for the security check of monthly users is mainly realized by loose check policies. End user behavior management is mainly realized by monitoring policies. If users need to formulate policies according to their own wishes, they can use them. Custom strategy.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Portal At the time of certification, pass Web After the browser enters the account password for authentication, it prompts" Authenticating.."The status lasts for a long time before it shows that the authentication is successful. Which of the following reasons may cause this phenomenon?

A.
Multiple Agile Controller The same terminal IP Address added Portal" Access terminal IP Address list", Some of them Agile Controller The server and the terminal cannot communicate normally.
A.
Multiple Agile Controller The same terminal IP Address added Portal" Access terminal IP Address list", Some of them Agile Controller The server and the terminal cannot communicate normally.
Answers
B.
Portal The template is configured with an incorrect password.
B.
Portal The template is configured with an incorrect password.
Answers
C.
Agile Controller-Campus There are too many authorization rules on the "It takes a lot of time to find 835
C.
Agile Controller-Campus There are too many authorization rules on the "It takes a lot of time to find 835
Answers
D.
Insufficient curtains of the terminal equipment result in a relatively large delay.
D.
Insufficient curtains of the terminal equipment result in a relatively large delay.
Answers
Suggested answer: A

In a WLAN network, intra-group isolation and inter-group isolation can be used at the same time.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 367 questions
Go to page: of 37