ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











Regarding the basic principles of user access security, it is wrong not to list any description?

A.
When a terminal device accesses the network, it first authenticates the user's identity through the access device, and the access device cooperates with the authentication server to complete the user Authentication.
A.
When a terminal device accesses the network, it first authenticates the user's identity through the access device, and the access device cooperates with the authentication server to complete the user Authentication.
Answers
B.
The terminal device directly interacts with the security policy server, and the terminal reports its own status information, including virus database version, operating system version, and terminal Information such as the patch version installed on the device.
B.
The terminal device directly interacts with the security policy server, and the terminal reports its own status information, including virus database version, operating system version, and terminal Information such as the patch version installed on the device.
Answers
C.
The security policy server checks the status information of the terminal, and for terminal devices that do not meet the corporate security standards, the security policy server reissues. The authorization information is given to the access device.
C.
The security policy server checks the status information of the terminal, and for terminal devices that do not meet the corporate security standards, the security policy server reissues. The authorization information is given to the access device.
Answers
D.
The terminal device selects the answer to the resource to be accessed according to the result of the status check.
D.
The terminal device selects the answer to the resource to be accessed according to the result of the status check.
Answers
Suggested answer: D

Which of the following law items is the most blessed for safety? This should be true?

A.
Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00
A.
Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00
Answers
B.
Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.
B.
Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.
Answers
C.
The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.
C.
The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.
Answers
D.
Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.
D.
Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.
Answers
Suggested answer: D

Regarding the principle of MAC authentication, which of the following descriptions is wrong?

A.
MAC Certification required Portal Server cooperation.
A.
MAC Certification required Portal Server cooperation.
Answers
B.
MAC Certification is passed 802.1X Implementation of the agreement.
B.
MAC Certification is passed 802.1X Implementation of the agreement.
Answers
C.
MAC Authentication requires obtaining the terminal's MAC The address is stored in AAA server.
C.
MAC Authentication requires obtaining the terminal's MAC The address is stored in AAA server.
Answers
D.
NAS Device Configuration MAC After authentication, the terminal's MAC The address is used as the username and password.
D.
NAS Device Configuration MAC After authentication, the terminal's MAC The address is used as the username and password.
Answers
Suggested answer: A

The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.

When the account is distributed to users, what stage does the distribution of the account belong to?

A.
Page customization stage
A.
Page customization stage
Answers
B.
Account application stage
B.
Account application stage
Answers
C.
User authentication phase
C.
User authentication phase
Answers
D.
Audit and cancellation stage
D.
Audit and cancellation stage
Answers
Suggested answer: B

According to the different user name format and content used by the access device to verify user identity, the user name format used for MAC authentication can be changed.

There are three types. Which of the following formats is not included?

A.
MAC Address format
A.
MAC Address format
Answers
B.
Fixed username form
B.
Fixed username form
Answers
C.
DHCP Option format
C.
DHCP Option format
Answers
D.
ARP Option format
D.
ARP Option format
Answers
Suggested answer: D

An account can belong to multiple roles, that is, a user may hold multiple positions.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

An account can only belong to one user group, that is, a user can only belong to one department.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Visitors refer to users who need temporary access to the network at a specific location.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The access control server is the implementer of the corporate security policy, responsible for implementing the corresponding access control in accordance with the security policy formulated by the customer's network(Allow, deny, leave or restrict).

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?

A.
Deploy the main DB
A.
Deploy the main DB
Answers
B.
Deploy image DBO
B.
Deploy image DBO
Answers
C.
Deploy witness DB
C.
Deploy witness DB
Answers
D.
Deploy MC and SM dual machine backup
D.
Deploy MC and SM dual machine backup
Answers
Suggested answer: D
Total 367 questions
Go to page: of 37