ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











Portal page push rules have priority, and the rules with higher priority are matched with the user's authentication information first. If none of the configured rules match, The default rules are used.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The following is the 802.1X access control switch configuration:

[S5720]dot1x authentication-method eap

[S5720-GigabitEthernet0/0/1] port link-type access

[S5720-GigabitEthemet0/0/1] port default vlan 11

[S5720-GigabitEthernet0/0/1] authentication dot1x

Assuming that GE0/0/1 is connected to user 1 and user 2 through the HUB, which of the following options is correct?

A.
After user 1 is authenticated, user 2 can access network resources without authentication
A.
After user 1 is authenticated, user 2 can access network resources without authentication
Answers
B.
User 1 and User 2 must be individually authenticated before they can access network resources
B.
User 1 and User 2 must be individually authenticated before they can access network resources
Answers
C.
GE0/0/1 does not need to enable dot1X
C.
GE0/0/1 does not need to enable dot1X
Answers
D.
Neither user 1 nor user 2 can pass the authentication and access network resources.
D.
Neither user 1 nor user 2 can pass the authentication and access network resources.
Answers
Suggested answer: A

Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?

A.
Short message
A.
Short message
Answers
B.
E-mail
B.
E-mail
Answers
C.
Web Print
C.
Web Print
Answers
D.
Voicemail
D.
Voicemail
Answers
Suggested answer: D

Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice

How to solve the problem of mobile office system?

A.
Directly discard data sent by devices that do not comply with regulations
A.
Directly discard data sent by devices that do not comply with regulations
Answers
B.
Certification of non-compliant equipment.
B.
Certification of non-compliant equipment.
Answers
C.
Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.
C.
Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.
Answers
D.
Send alarm information to notify the administrator to deal with it.
D.
Send alarm information to notify the administrator to deal with it.
Answers
Suggested answer: C

For the convenience of visitors, different authentication and master pages can be distributed for different visitors. When configuring the push page strategy, different matching conditions need to be defined, so which of the following options can be used as the limited matching conditions? (Multiple choice)

A.
Terminal P address
A.
Terminal P address
Answers
B.
Location information of the access device
B.
Location information of the access device
Answers
C.
Priority of guest accounts
C.
Priority of guest accounts
Answers
D.
Connected to the network SSID'
D.
Connected to the network SSID'
Answers
Suggested answer: A, D

In the terminal security management, the black and white list mode is used to check the terminal host software installation status. Which of the following situations is a compliant behavior?

A.
The terminal host does not install the software in the whitelist, nor the software in the blacklist.
A.
The terminal host does not install the software in the whitelist, nor the software in the blacklist.
Answers
B.
The terminal host installs all the software in the whitelist, but does not install the software in the blacklist.
B.
The terminal host installs all the software in the whitelist, but does not install the software in the blacklist.
Answers
C.
The terminal host installs part of the software in the whitelist, but does not install the software in the blacklist.
C.
The terminal host installs part of the software in the whitelist, but does not install the software in the blacklist.
Answers
D.
The terminal host installs all the software in the whitelist, and also installs some of the software in the blacklist.
D.
The terminal host installs all the software in the whitelist, and also installs some of the software in the blacklist.
Answers
Suggested answer: B

The terminal host access control function does not take effect, the following is SACG View information on:

<FW> display right- manager role-id rule Advanced ACL 3099 ,25 rules,not bingding with vpn-instance Ad's step is 1 rule 1000 permit ip (1280 times matched) rule 1001 permit ip destination 172.18.11.2210 (581 times matched) rule 1002 permit ip destination 172:18.11.2230 (77 times matched) rule 1003 permit ip destination 172.19.0.0 0.0 255.255 (355 Book times matched) rule 1004 deny ip (507759 times matched) Which of the following statements is correct?

A.
172.18.11.221 It is the server of the isolation domain.
A.
172.18.11.221 It is the server of the isolation domain.
Answers
B.
The escape route was opened.
B.
The escape route was opened.
Answers
C.
172.18.11.223 It is a post-domain server.
C.
172.18.11.223 It is a post-domain server.
Answers
D.
The terminal host stream is the default ACL Blocked.
D.
The terminal host stream is the default ACL Blocked.
Answers
Suggested answer: B

Which of the following equipment is suitable for use MAC Authentication access network?

A.
Office Windows System host
A.
Office Windows System host
Answers
B.
For testing Linux System host
B.
For testing Linux System host
Answers
C.
Mobile client, such as smart phone, etc
C.
Mobile client, such as smart phone, etc
Answers
D.
Network printer 232335
D.
Network printer 232335
Answers
Suggested answer: D

For hardware SACC Access control, if the terminal does not pass the authentication, it can access the resources of the post-authentication domain. This phenomenon may be caused by the following reasons? (Multiple choice)

A.
Authentication data flow has passed SACG filter.
A.
Authentication data flow has passed SACG filter.
Answers
B.
TSM No hardware is added to the system SACG equipment.
B.
TSM No hardware is added to the system SACG equipment.
Answers
C.
SACG Enable the default inter-domain packet filtering.
C.
SACG Enable the default inter-domain packet filtering.
Answers
D.
Privileges are misconfigured IP
D.
Privileges are misconfigured IP
Answers
Suggested answer: C, D

If you use a normal account for authentication, which of the following descriptions is wrong?

A.
Users can use Any Office Perform authentication.
A.
Users can use Any Office Perform authentication.
Answers
B.
User can't use web Way to authenticate.
B.
User can't use web Way to authenticate.
Answers
C.
Users can use Web Agent Perform authentication.
C.
Users can use Web Agent Perform authentication.
Answers
D.
Users can use their own 802. 1X The client authenticates.
D.
Users can use their own 802. 1X The client authenticates.
Answers
Suggested answer: B
Total 367 questions
Go to page: of 37