ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

Related questions











Regarding uninstalling the Agile Controller-Campus in Windows and Linux systems, which of the following descriptions is correct?

A.
Use a common account to execute sh uninstall.sh in the Agile Controller/Uninstall directory to start the uninstallation program.
A.
Use a common account to execute sh uninstall.sh in the Agile Controller/Uninstall directory to start the uninstallation program.
Answers
B.
Use the root account to execute sh uninstall.sh in the Agile Controller directory to start the uninstallation program. :
B.
Use the root account to execute sh uninstall.sh in the Agile Controller directory to start the uninstallation program. :
Answers
C.
On the Windows platform, select "Start>All Programs>Huawei>Agile Controller>Server Startup config".
C.
On the Windows platform, select "Start>All Programs>Huawei>Agile Controller>Server Startup config".
Answers
D.
On the Windows platform, select "Start>All Programs> Huawei> Agile Controller>Uninstall
D.
On the Windows platform, select "Start>All Programs> Huawei> Agile Controller>Uninstall
Answers
Suggested answer: D

In enterprises where terminal host access control management is relatively strict, administrators hope to bind terminal hosts and accounts to prevent terminal users from accessing the controlled network from unauthorized terminal hosts at will. Regarding the description of binding the terminal host and account, which of the following is correct?

A.
exist Any Office When logging in with an account for the first time, the terminal host is automatically bound to the current account, but the automatic binding process requires administrator approval
A.
exist Any Office When logging in with an account for the first time, the terminal host is automatically bound to the current account, but the automatic binding process requires administrator approval
Answers
B.
When other accounts need to be authenticated on the bound terminal host, there is no need to find the asset owner who is bound for the first time to authorize themselves.
B.
When other accounts need to be authenticated on the bound terminal host, there is no need to find the asset owner who is bound for the first time to authorize themselves.
Answers
C.
Binding terminal hosts and accounts is only applicable to terminal users through Any Office Scenarios for authentication, Not applicable Web Agent Plugins and Web The scenario where the client authenticates.
C.
Binding terminal hosts and accounts is only applicable to terminal users through Any Office Scenarios for authentication, Not applicable Web Agent Plugins and Web The scenario where the client authenticates.
Answers
D.
There are only consoles in the account binding terminal host, which cannot be configured by the administrator.
D.
There are only consoles in the account binding terminal host, which cannot be configured by the administrator.
Answers
Suggested answer: C

Regarding the way SACG devices connect to the network, which of the following descriptions are correct? (multiple choice)

A.
SACG The equipment requires Layer 3 intercommunication with the terminal.
A.
SACG The equipment requires Layer 3 intercommunication with the terminal.
Answers
B.
SACG It is usually connected to the core switch equipment and uses policy routing to divert traffic.
B.
SACG It is usually connected to the core switch equipment and uses policy routing to divert traffic.
Answers
C.
SACG Support hanging on non-Huawei devices.
C.
SACG Support hanging on non-Huawei devices.
Answers
D.
SACG Equipment requirements and Agile Controller-Campus Interoperability on the second floor.
D.
SACG Equipment requirements and Agile Controller-Campus Interoperability on the second floor.
Answers
Suggested answer: B, C

About the software SACG And hardware SACG Description, which of the following is correct?

A.
hardware SACG use Any Office Perform admission control.
A.
hardware SACG use Any Office Perform admission control.
Answers
B.
software SACG use Any Office Perform admission control.
B.
software SACG use Any Office Perform admission control.
Answers
C.
hardware SACG Than software SACG cut costs.
C.
hardware SACG Than software SACG cut costs.
Answers
D.
hardware SACG The security is higher.
D.
hardware SACG The security is higher.
Answers
Suggested answer: B

Secure email is Any ffice Solution for corporate office 0A The killer application provided, it provides powerful email business capabilities and rich email strategies. For secure mail, which of the following descriptions are correct? (Multiple choice)

A.
Through the mail client, you can connect No or Exchange Mail system.
A.
Through the mail client, you can connect No or Exchange Mail system.
Answers
B.
Support automatic mail transmission encryption, transmission encryption method supports a full range of IPSec/TLS protocol.
B.
Support automatic mail transmission encryption, transmission encryption method supports a full range of IPSec/TLS protocol.
Answers
C.
Online survey of attached documents is not supported.
C.
Online survey of attached documents is not supported.
Answers
D.
Support MAP4/SMTP/EAS Send and receive emails with standard protocols such as, and support real-time email push.
D.
Support MAP4/SMTP/EAS Send and receive emails with standard protocols such as, and support real-time email push.
Answers
Suggested answer: A, D

The user accesses the network through the network access device, and the third-party RADIUS server authenticates and authorizes the user. Regarding the certification process, which of the following options is wrong?

A.
Configure RADIUS authentication and accounting on the RADIUS server.
A.
Configure RADIUS authentication and accounting on the RADIUS server.
Answers
B.
Configure the Agile Controller-Campus for local data source authentication, receive the packets sent by the device, and perform authentication.
B.
Configure the Agile Controller-Campus for local data source authentication, receive the packets sent by the device, and perform authentication.
Answers
C.
Configure RADIUS authentication and accounting on the device side. W"
C.
Configure RADIUS authentication and accounting on the device side. W"
Answers
D.
Configure RADIUS authentication and authorization on the Agile Controller-Campus.
D.
Configure RADIUS authentication and authorization on the Agile Controller-Campus.
Answers
Suggested answer: B

The use of the 802.1X authentication scheme generally requires the terminal to install specific client software. For large-scale deployment of client software, the methods that can be taken. What are the cases? (multiple choices)

A.
Enable Guest VLAN so that users can obtain the installation package in Guest VLAN
A.
Enable Guest VLAN so that users can obtain the installation package in Guest VLAN
Answers
B.
Configure Free-rule and web push functions on the switch to push the installation package to users.
B.
Configure Free-rule and web push functions on the switch to push the installation package to users.
Answers
C.
Copy the installation packages to each other via U disk.
C.
Copy the installation packages to each other via U disk.
Answers
D.
Installed by the administrator for each user.
D.
Installed by the administrator for each user.
Answers
Suggested answer: A, B

For the scenario where the authentication server adopts distributed deployment, which of the following descriptions are correct? (multiple choice)

A.
The enterprise network is relatively scattered, there are multiple branches, and the branch users are larger in scale.
A.
The enterprise network is relatively scattered, there are multiple branches, and the branch users are larger in scale.
Answers
B.
A scenario where there are less than 2,000 branch users, and the headquarters and branch networks are relatively stable.
B.
A scenario where there are less than 2,000 branch users, and the headquarters and branch networks are relatively stable.
Answers
C.
The terminal security management business between the branch and the headquarters is relatively independent, and the headquarters provides supervision and control over the branch terminal security management business.
C.
The terminal security management business between the branch and the headquarters is relatively independent, and the headquarters provides supervision and control over the branch terminal security management business.
Answers
D.
It is difficult to guarantee the quality of the network between the branch and the headquarters, and the network between the headquarters and the branch may be interrupted, making the terminal of the branch no longer available.
D.
It is difficult to guarantee the quality of the network between the branch and the headquarters, and the network between the headquarters and the branch may be interrupted, making the terminal of the branch no longer available.
Answers
Suggested answer: A, D

Regarding the description of the security zone in the Agile Controller-Campus, which of the following options are correct? (multiple choice)

A.
The user domain is generally composed of various terminal users. The terminals in this area have the characteristics of large numbers, wide distribution, and strong mobility.
A.
The user domain is generally composed of various terminal users. The terminals in this area have the characteristics of large numbers, wide distribution, and strong mobility.
Answers
B.
The business domain is a platform for the heavy load of business flows. According to the needs of the enterprise, security technology is used to logically divide the business to realize the security of the network.
B.
The business domain is a platform for the heavy load of business flows. According to the needs of the enterprise, security technology is used to logically divide the business to realize the security of the network.
Answers
C.
The network domain is the most concerned security protection area of various enterprises, and it carries the important and core information assets of the enterprise.
C.
The network domain is the most concerned security protection area of various enterprises, and it carries the important and core information assets of the enterprise.
Answers
D.
The service domain is the area that provides security services for the corporate intranet. This area is generally composed of systems that provide security services such as antivirus servers, patch management servers, and terminal security servers.
D.
The service domain is the area that provides security services for the corporate intranet. This area is generally composed of systems that provide security services such as antivirus servers, patch management servers, and terminal security servers.
Answers
Suggested answer: A, D

In WPA2, because of the more secure encryption technology-TKIP/MIC, WPA2 is more secure than WPA.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B
Total 367 questions
Go to page: of 37