ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











An enterprise adopts hardware SACG access method for admission control. The configuration commands are as follows, among which Key; Admin@123 [USG] right-manager server-group [USG-rightm] localip 10.1.10.2 [USG-rightm] serverip 10. 1.31.78 shared-key AdnIn@123 [USG2100-rightm] right-manager server-group enable.

Assuming that the other configurations are correct, based on the above configuration only, which of the following options is correct?

A.
After completing the configuration, SACG can successfully link with the Agile Controller-Campus.
A.
After completing the configuration, SACG can successfully link with the Agile Controller-Campus.
Answers
B.
After completing the configuration, SACG cannot successfully link with Agile Contrlle-Campus. P
B.
After completing the configuration, SACG cannot successfully link with Agile Contrlle-Campus. P
Answers
C.
Can issue pre-authentication domain ACL.
C.
Can issue pre-authentication domain ACL.
Answers
D.
The linkage cannot be successful but the terminal can access the pre-authentication domain server.
D.
The linkage cannot be successful but the terminal can access the pre-authentication domain server.
Answers
Suggested answer: B

Regarding the definition of WIPS/WIDS, which of the following statements is correct?

A.
WIDS Is a wireless intrusion prevention system
A.
WIDS Is a wireless intrusion prevention system
Answers
B.
WIPS Wireless intrusion detection system
B.
WIPS Wireless intrusion detection system
Answers
C.
WIDS Is a wireless intrusion countermeasure system
C.
WIDS Is a wireless intrusion countermeasure system
Answers
D.
WIPS Is a wireless intrusion prevention system
D.
WIPS Is a wireless intrusion prevention system
Answers
Suggested answer: D

Deploying on Windows platform, using SQL Server database About the HA function of Agile Cotoller- Campus, which of the following descriptions Is it correct? (multiple choice)

A.
Deployment Management Center MC Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.
A.
Deployment Management Center MC Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.
Answers
B.
Deploy Business Manager SM Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.
B.
Deploy Business Manager SM Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.
Answers
C.
Deploy business controller 3SC Time, support HA, Provide a backup solution in resource pool mode, which needs to be deployed N+1 indivual SC
C.
Deploy business controller 3SC Time, support HA, Provide a backup solution in resource pool mode, which needs to be deployed N+1 indivual SC
Answers
D.
Deploy the database DB Time, support HA use SQL Server Database mirroring technology requires the deployment of master DB+Mirroring DB+witness DB.
D.
Deploy the database DB Time, support HA use SQL Server Database mirroring technology requires the deployment of master DB+Mirroring DB+witness DB.
Answers
Suggested answer: C, D

There is a three-layer forwarding device between the authentication client and the admission control device:If at this time Portal The certified three-layer authentication device can also obtain the authentication client's MAC address,So you can use IP Address and MC The address serves as the information to identify the user.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Regarding the description of the logic architecture of the business accompanying, which of the following options is correct?

A.
The business management plane focuses on administrators, authentication servers, and policy servers.
A.
The business management plane focuses on administrators, authentication servers, and policy servers.
Answers
B.
The network equipment plane focuses on user terminals and static resources.
B.
The network equipment plane focuses on user terminals and static resources.
Answers
C.
The user plane focuses on authentication points and policy enforcement points.
C.
The user plane focuses on authentication points and policy enforcement points.
Answers
D.
The business free mobility logic architecture includes a management subsystem, an authentication and authorization subsystem, and a business strategy subsystem.
D.
The business free mobility logic architecture includes a management subsystem, an authentication and authorization subsystem, and a business strategy subsystem.
Answers
Suggested answer: A

In a centralized networking, the database, SM server, SC server, and AE server are all centrally installed in the corporate headquarters. This networking method is suitable. It is used for enterprises with a wide geographical distribution of users and a large number of users.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which of the following options is correct for the description of the role of the isolation domain?

A.
Isolation domain refers to the area that the terminal host can access before passing the identity authentication, such as DNS server, external authentication source, business controller (SC)c The area where the service manager (SM) is located.
A.
Isolation domain refers to the area that the terminal host can access before passing the identity authentication, such as DNS server, external authentication source, business controller (SC)c The area where the service manager (SM) is located.
Answers
B.
Isolation domain refers to the area that is allowed to be accessed when the terminal user passes the identity authentication but fails the security authentication, such as patch server, virus database server. The area where the server is located.
B.
Isolation domain refers to the area that is allowed to be accessed when the terminal user passes the identity authentication but fails the security authentication, such as patch server, virus database server. The area where the server is located.
Answers
C.
Isolation domain refers to the area that terminal users can access after passing identity authentication and security authentication, such as ERP system, financial system database system.The area where you are.
C.
Isolation domain refers to the area that terminal users can access after passing identity authentication and security authentication, such as ERP system, financial system database system.The area where you are.
Answers
D.
End users can access the isolated domain regardless of whether they pass identity authentication.
D.
End users can access the isolated domain regardless of whether they pass identity authentication.
Answers
Suggested answer: B

What are the three main steps of business free deployment? (Multiple choice)

A.
Define security group
A.
Define security group
Answers
B.
Define and deploy group policies
B.
Define and deploy group policies
Answers
C.
The system runs automatically
C.
The system runs automatically
Answers
D.
Security group reported by the system
D.
Security group reported by the system
Answers
E.
Define user groups
E.
Define user groups
Answers
Suggested answer: A, B, C

Visitor management can authorize visitors based on their account number, time, location, terminal type, access method, etc., and can also push personalized pages to visitors based on time, location, and terminal type.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following options are correct for the description of visitor management? (Multiple choice)

A.
Visitor registration account can be configured to be exempt from approval
A.
Visitor registration account can be configured to be exempt from approval
Answers
B.
Guest login can only be configured as Web Way of webpage
B.
Guest login can only be configured as Web Way of webpage
Answers
C.
Anonymous account authentication cannot be performed on the guest authentication page
C.
Anonymous account authentication cannot be performed on the guest authentication page
Answers
D.
Visitor account approval information can be notified to visitors via SMS
D.
Visitor account approval information can be notified to visitors via SMS
Answers
Suggested answer: A, D
Total 367 questions
Go to page: of 37