ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











802.1X During the authentication, if the authentication point is at the aggregation switch, in addition to RADIUS,AAA,802.1X In addition to the conventional configuration, what special configuration is needed?

A.
Both the aggregation layer and the access layer switches need to be turned on 802.1X Function.
A.
Both the aggregation layer and the access layer switches need to be turned on 802.1X Function.
Answers
B.
Access layer switch needs to be configured 802. 1X Transparent transmission of messages.
B.
Access layer switch needs to be configured 802. 1X Transparent transmission of messages.
Answers
C.
The aggregation switch needs to be configured 802 1X Transparent transmission of messages.
C.
The aggregation switch needs to be configured 802 1X Transparent transmission of messages.
Answers
D.
No special configuration required
D.
No special configuration required
Answers
Suggested answer: B

There are two ways for Business Manager to download patches. When using hierarchical deployment, you can download patches directly from the management center or through Microsoft patches Server download patch.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

There are two types of accounts on the Agile Controller-Campus: one is a local account and the other is an external account.

Which of the following is not a local account?

A.
Ordinary account
A.
Ordinary account
Answers
B.
Guest account
B.
Guest account
Answers
C.
Anonymous account
C.
Anonymous account
Answers
D.
Mobile certificate account
D.
Mobile certificate account
Answers
Suggested answer: D

Regarding the identity authentication method and authentication type, which of the following descriptions is correct?

A.
User passed web The method can support two authentication types: local authentication and digital certificate authentication.
A.
User passed web The method can support two authentication types: local authentication and digital certificate authentication.
Answers
B.
User passed web Agent The method can support two authentication types: digital certificate authentication and system authentication.
B.
User passed web Agent The method can support two authentication types: digital certificate authentication and system authentication.
Answers
C.
User passed Agent The method can support three authentication types: local authentication, digital certificate authentication and system authentication.
C.
User passed Agent The method can support three authentication types: local authentication, digital certificate authentication and system authentication.
Answers
D.
User passed web Agent The method can support two authentication types: digital certificate authentication and local authentication.
D.
User passed web Agent The method can support two authentication types: digital certificate authentication and local authentication.
Answers
Suggested answer: C

Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.

Logical are a. Which of the following options does not belong Agile Controller-Campus Security domain?

A.
User domain
A.
User domain
Answers
B.
Network domain
B.
Network domain
Answers
C.
Business domain:
C.
Business domain:
Answers
D.
Attack domain
D.
Attack domain
Answers
Suggested answer: D

Regarding patch management and Windows patch checking strategies, which of the following descriptions is wrong?

A.
Patch management and Windows The patch check strategy can check whether the terminal host has installed the specified Windows Make system patches.
A.
Patch management and Windows The patch check strategy can check whether the terminal host has installed the specified Windows Make system patches.
Answers
B.
Windows Patch check strategy focuses on checking whether the terminal host is installed Windows Operating system patches.
B.
Windows Patch check strategy focuses on checking whether the terminal host is installed Windows Operating system patches.
Answers
C.
When the terminal host does not install the specified Windows When making a system patch, according to Windows The patch check policy prohibits terminal hosts from accessing the controlled network.
C.
When the terminal host does not install the specified Windows When making a system patch, according to Windows The patch check policy prohibits terminal hosts from accessing the controlled network.
Answers
D.
Patch management focuses on checking whether the terminal host has installed the specified patch,Perform access control on the terminal host.
D.
Patch management focuses on checking whether the terminal host has installed the specified patch,Perform access control on the terminal host.
Answers
Suggested answer: D

In the Agile Controller-Campus admission control technology framework, regarding the description of RADIUS, which of the following options is correct?

A.
PADIUS Used on the client and 802.1X Information such as user names and passwords are passed between switches.
A.
PADIUS Used on the client and 802.1X Information such as user names and passwords are passed between switches.
Answers
B.
PADIUS Used in 802.1X Switch and AAA Information such as user name and password are passed between servers.
B.
PADIUS Used in 802.1X Switch and AAA Information such as user name and password are passed between servers.
Answers
C.
PADIUS Used for Portal Server pushes to users Web page.
C.
PADIUS Used for Portal Server pushes to users Web page.
Answers
D.
PADIUS Used for server to SACG Security policy issued by the device
D.
PADIUS Used for server to SACG Security policy issued by the device
Answers
Suggested answer: B

Which of the following options belongs to MC prioritized pail Authentication application scenarios?

A.
User use portal Page for authentication
A.
User use portal Page for authentication
Answers
B.
Users follow WeChat for authentication.
B.
Users follow WeChat for authentication.
Answers
C.
User use IAC Client authentication
C.
User use IAC Client authentication
Answers
D.
User use Pota At the first certification, RAOIUS Used by the server cache terminal MAC Address, if the terminal goes offline and then goes online again within the validity period of the cache, RAIUS The server directly searches the cache for the terminal's MAC The address is discussed.
D.
User use Pota At the first certification, RAOIUS Used by the server cache terminal MAC Address, if the terminal goes offline and then goes online again within the validity period of the cache, RAIUS The server directly searches the cache for the terminal's MAC The address is discussed.
Answers
Suggested answer: D

A network adopts 802. 1X To authenticate access users, the access control equipment is deployed at the convergence layer, and after the deployment is completed, it is used on the access control equipment t-aa The command test is successful, but the user cannot access the network. The failure may be caused by the following reasons? (Multiple choice)

A.
The aggregation layer device is not configured RADIUS Certification template.
A.
The aggregation layer device is not configured RADIUS Certification template.
Answers
B.
Agile Controller-Campus The switch is not added on NAS equipment.
B.
Agile Controller-Campus The switch is not added on NAS equipment.
Answers
C.
Connect to the terminal on the device to open 802.1X Function.
C.
Connect to the terminal on the device to open 802.1X Function.
Answers
D.
The Layer 2 link is used between the access device and the aggregation device, and it is not turned on 802 Instrument transparent transmission function
D.
The Layer 2 link is used between the access device and the aggregation device, and it is not turned on 802 Instrument transparent transmission function
Answers
Suggested answer: C, D

View on the switch Agile Controller-Campus The policy issued by the server is as follows:

For this strategy, which of the following options are correct? (Multiple choice)

A.
Common_ user Users can access Internet www H.
A.
Common_ user Users can access Internet www H.
Answers
B.
VIP Users can access Internet w H.
B.
VIP Users can access Internet w H.
Answers
C.
VIP Can visit Mail Server H.
C.
VIP Can visit Mail Server H.
Answers
D.
Common user Users can access Mail_ Sever resource.
D.
Common user Users can access Mail_ Sever resource.
Answers
Suggested answer: B, C, D
Total 367 questions
Go to page: of 37