ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











Regarding MAC authentication and MAC bypass authentication, which of the following descriptions are correct? (multiple choice)

A.
The biggest difference between the two is MAC Bypass authentication belongs to 802 1X Certification, while MAC Certification does not belong to 802 1X Certification.
A.
The biggest difference between the two is MAC Bypass authentication belongs to 802 1X Certification, while MAC Certification does not belong to 802 1X Certification.
Answers
B.
If a network can connect to dumb terminals(printer,IP telephone), The text may be connected to a portable computer, please use MAC Bypass authentication:First try 802 1X Authentication, try again if authentication fails MAC Certification
B.
If a network can connect to dumb terminals(printer,IP telephone), The text may be connected to a portable computer, please use MAC Bypass authentication:First try 802 1X Authentication, try again if authentication fails MAC Certification
Answers
C.
If a network will only connect to dumb terminals(printer,IP telephone),please use MAC Certification in order to shorten the certification time.
C.
If a network will only connect to dumb terminals(printer,IP telephone),please use MAC Certification in order to shorten the certification time.
Answers
D.
MAC Authentication MAC One more bypass authentication 802 In the instrument certification process, the open time is longer than MAC The bypass authentication time is long.
D.
MAC Authentication MAC One more bypass authentication 802 In the instrument certification process, the open time is longer than MAC The bypass authentication time is long.
Answers
Suggested answer: A, B, C

Guest management is Agile Controller-Campus Important function of, regarding visitor management, which of the following statements are correct? (Multiple choice)

A.
Visitors can use their mobile phone number to quickly register an account
A.
Visitors can use their mobile phone number to quickly register an account
Answers
B.
The administrator can assign different permissions to each visitor
B.
The administrator can assign different permissions to each visitor
Answers
C.
Reception staff cannot create guest accounts
C.
Reception staff cannot create guest accounts
Answers
D.
There is a violation of the guest account, and the administrator cannot retrospectively
D.
There is a violation of the guest account, and the administrator cannot retrospectively
Answers
Suggested answer: A, B

Regarding the file source set in the software management, which of the following descriptions is correct?

A.
When the file source is an internal data source, when distributing software, the business manager will only send the path of the data source of the software to be distributed to Any Office
A.
When the file source is an internal data source, when distributing software, the business manager will only send the path of the data source of the software to be distributed to Any Office
Answers
B.
When the file source is an external data source, Any 0fce will obtain the software to be distributed.
B.
When the file source is an external data source, Any 0fce will obtain the software to be distributed.
Answers
C.
External data sources cannot distribute files from FTP-type file servers.
C.
External data sources cannot distribute files from FTP-type file servers.
Answers
D.
The Microsoft Windows file sharing server uses the UNC (Universal Naming Conversion) path (beginning with "\\") to provide waiting. The path to distribute the software.
D.
The Microsoft Windows file sharing server uses the UNC (Universal Naming Conversion) path (beginning with "\\") to provide waiting. The path to distribute the software.
Answers
Suggested answer: D

If you are deploying BYOD When the system is installed, use a stand-alone installation SM, Dualmachine installation SC, Stand-alone hardware deployment AE,Which of the following descriptions are correct? (Multiple choice)

A.
AE Server priority use)SC server.
A.
AE Server priority use)SC server.
Answers
B.
Install AE When the server, you need to configure the main and standby SC Server IP address.
B.
Install AE When the server, you need to configure the main and standby SC Server IP address.
Answers
C.
If the Lord SC After the server fails,AE The server will use the backup SC server.
C.
If the Lord SC After the server fails,AE The server will use the backup SC server.
Answers
D.
host SC After the server is restored,AE Server will not switch back to master SC The server handles the business.
D.
host SC After the server is restored,AE Server will not switch back to master SC The server handles the business.
Answers
Suggested answer: B, C

The relationship between user groups and accounts in user management is stored in a tree on the Agile Controller-Campus. An account belongs to only one user group.

Consistent with the corporate organizational structure: If the OU (OnizbonUnit) structure stored in the AD/LDAP server is consistent with the corporate organizational structure, users are stored Under 0OU, when the Agile Controller-Campus synchronizes AD/LDAP server accounts, which synchronization method can be used?

A.
Press "0U" to synchronize
A.
Press "0U" to synchronize
Answers
B.
AO Synchronize by "group", "0U describes the organizational structure
B.
AO Synchronize by "group", "0U describes the organizational structure
Answers
C.
AO Press "Group" "Synchronize," "Group" Jida organization structure
C.
AO Press "Group" "Synchronize," "Group" Jida organization structure
Answers
D.
LDAP synchronization by "group"
D.
LDAP synchronization by "group"
Answers
Suggested answer: A

In some scenarios, an anonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)

A.
The use of anonymous accounts for authentication is based on the premise of trusting the other party, and the authentication agency does not need the other party to provide identity information to provide services to the other party.
A.
The use of anonymous accounts for authentication is based on the premise of trusting the other party, and the authentication agency does not need the other party to provide identity information to provide services to the other party.
Answers
B.
Agile Controller-Campus Need to be manually created"~anonymous"account number.
B.
Agile Controller-Campus Need to be manually created"~anonymous"account number.
Answers
C.
By default, the access control and policy of anonymous accounts cannot be performed. 1 Operations such as invoking patch templates and software distribution.
C.
By default, the access control and policy of anonymous accounts cannot be performed. 1 Operations such as invoking patch templates and software distribution.
Answers
D.
Administrators cannot delete anonymous accounts"~anonymous*.
D.
Administrators cannot delete anonymous accounts"~anonymous*.
Answers
Suggested answer: A, D

Free mobility is a special access control method, according to the user's access location, access time, access method and terminal authorization instructions. Set permissions, as long as the user's access conditions remain unchanged, the permissions and network experience after accessing the network- -To q

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Portal authentication on the Agile Controller-Campus has been configured and is correct.

Configure the following commands on the access control switch:

[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255 Which of the following options are correct? (multiple choice)

A.
After the configuration is complete, the switch will automatically release the data flow to access the security controller, No need for manual configuration by the administrator.
A.
After the configuration is complete, the switch will automatically release the data flow to access the security controller, No need for manual configuration by the administrator.
Answers
B.
This configuration allows users to access network resources before authentication.
B.
This configuration allows users to access network resources before authentication.
Answers
C.
After the configuration is complete, the administrator still needs to manually configure the release network segment
C.
After the configuration is complete, the administrator still needs to manually configure the release network segment
Answers
D.
Only after the authentication is passed, the terminal can access 10.1.31.78 Host.
D.
Only after the authentication is passed, the terminal can access 10.1.31.78 Host.
Answers
Suggested answer: A, B

In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?

A.
DHCP
A.
DHCP
Answers
B.
ARP
B.
ARP
Answers
C.
CAPWAP
C.
CAPWAP
Answers
D.
802.11MAC
D.
802.11MAC
Answers
Suggested answer: D

Which of the following options belong to a third-party server account? (Multiple choice)

A.
AD account number
A.
AD account number
Answers
B.
Mobile certificate account)
B.
Mobile certificate account)
Answers
C.
Anonymous account
C.
Anonymous account
Answers
D.
Guest account
D.
Guest account
Answers
Suggested answer: A, B
Total 367 questions
Go to page: of 37