ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 35

Question list
Search
Search

List of questions

Search

Related questions











Regarding the description of the ACL used in the linkage between SACG equipment and the TSM system, which of the following statements is correct!?

A.
default ACL The rule group number can be arbitrarily specified.
A.
default ACL The rule group number can be arbitrarily specified.
Answers
B.
default ACL The rule group number can only be 3999.
B.
default ACL The rule group number can only be 3999.
Answers
C.
due to SACG Need to use ACL3099-3999 To pick TSM The rules issued by the system, so in the configuration TSM Before linkage, you need to ensure these ACL Not referenced by other functions.
C.
due to SACG Need to use ACL3099-3999 To pick TSM The rules issued by the system, so in the configuration TSM Before linkage, you need to ensure these ACL Not referenced by other functions.
Answers
D.
The original group number is 3099-3999 of ACL Even if it is occupied, it can be successfully activated TSM Linkage.
D.
The original group number is 3099-3999 of ACL Even if it is occupied, it can be successfully activated TSM Linkage.
Answers
Suggested answer: C

After configuring the announcement,Agile Controller-Campus The system cannot assign this announcement to which of the following objects?

A.
Assign to user
A.
Assign to user
Answers
B.
Assigned to account
B.
Assigned to account
Answers
C.
Assign to terminal IP Address range
C.
Assign to terminal IP Address range
Answers
D.
Assigned to places
D.
Assigned to places
Answers
Suggested answer: D

How to check whether the SM and SC silverware start normally after installing the Agile Controller- Campus) (multiple delivery)

A.
Open https://SM server IP:8943 in the browser, enter the account admin and the default passwordChangeme123, if the login is successful, it will be explained. The SIM components are normal.
A.
Open https://SM server IP:8943 in the browser, enter the account admin and the default passwordChangeme123, if the login is successful, it will be explained. The SIM components are normal.
Answers
B.
After logging in to SC, select Resources>Users>User Management to create a common account.Open https://SM server IP:8447 in the browser newauth, if you can successfully log in using theaccount created in the previous step, the SM component is normal.
B.
After logging in to SC, select Resources>Users>User Management to create a common account.Open https://SM server IP:8447 in the browser newauth, if you can successfully log in using theaccount created in the previous step, the SM component is normal.
Answers
C.
Open https://SC Server IP:8443 in the browser and enter the account admin and the defaultpassword Changeme123. If the login is successful, it will be explained. The SC component is normal.
C.
Open https://SC Server IP:8443 in the browser and enter the account admin and the defaultpassword Changeme123. If the login is successful, it will be explained. The SC component is normal.
Answers
D.
After logging in to SM, select Ziyuan>User>User Management, and Xinlu has a common part number. Open https://SC server IP:8447 newauth in the browser. If you can successfully log in with the account created in the previous step, it means that the SC component is Wang Chang.
D.
After logging in to SM, select Ziyuan>User>User Management, and Xinlu has a common part number. Open https://SC server IP:8447 newauth in the browser. If you can successfully log in with the account created in the previous step, it means that the SC component is Wang Chang.
Answers
Suggested answer: A, D

Which of the following series of devices does not support the function of accompanying business?

A.
S5720HI Series Switch:
A.
S5720HI Series Switch:
Answers
B.
AR Series router
B.
AR Series router
Answers
C.
USG6000 Series firewall
C.
USG6000 Series firewall
Answers
D.
SVN5600 series
D.
SVN5600 series
Answers
Suggested answer: B

Which of the following options cannot be triggered MAC Certification?

A.
ARP Message
A.
ARP Message
Answers
B.
DHCP Message P
B.
DHCP Message P
Answers
C.
DHCPv6 Message
C.
DHCPv6 Message
Answers
D.
ICMP Message
D.
ICMP Message
Answers
Suggested answer: D

In the terminal host check strategy, you can check whether the important subkeys and key values of the registry meet the requirements to control the terminal host's Access, which of the following check results will be recorded as violations?

(multiple choice)

A.
The registry does not contain the mandatory requirements of the policy"Subkeys and key values".
A.
The registry does not contain the mandatory requirements of the policy"Subkeys and key values".
Answers
B.
The registry contains the mandatory requirements of the policy"Subkeys and key values",
B.
The registry contains the mandatory requirements of the policy"Subkeys and key values",
Answers
C.
The registry contains the prohibited"Subkeys and key values"W
C.
The registry contains the prohibited"Subkeys and key values"W
Answers
D.
The registry does not contain any prohibited by this policy"Subkeys and key values"
D.
The registry does not contain any prohibited by this policy"Subkeys and key values"
Answers
Suggested answer: A, C

Regarding the use of MAC authentication to access the network in the WLAN networking environment, which of the following statements is wrong en.

A.
MAC authentication does not require users to install any client software.
A.
MAC authentication does not require users to install any client software.
Answers
B.
The user name format used by MAC authentication is only one of MAC address user name format.
B.
The user name format used by MAC authentication is only one of MAC address user name format.
Answers
C.
MAC authentication actually uses 802 1X authentication method.
C.
MAC authentication actually uses 802 1X authentication method.
Answers
D.
MAC bypass authentication solves the situation of both 802.1x client authentication and MAC authentication in the same network environment.
D.
MAC bypass authentication solves the situation of both 802.1x client authentication and MAC authentication in the same network environment.
Answers
Suggested answer: B

Business accompanying is-A special access control method, according to the user's access location, access time, access method and terminal use to grant designated investment limits, among which the physical connection can be divided into 3 Class, excluding which of the following access methods?

A.
Wired access
A.
Wired access
Answers
B.
Wireless access
B.
Wireless access
Answers
C.
VPN Access
C.
VPN Access
Answers
D.
802.1X Access
D.
802.1X Access
Answers
Suggested answer: D

In the Agile Controller-Campus admission control scenario, regarding the role description of the RADIUS server I client, which of the following is positive True?

A.
Agile Controller-Campus Integrated RADIUS All functions of server and client."
A.
Agile Controller-Campus Integrated RADIUS All functions of server and client."
Answers
B.
Agile Controller-Campus As RADIUS On the server side, the user terminal acts as RADIUS Client.
B.
Agile Controller-Campus As RADIUS On the server side, the user terminal acts as RADIUS Client.
Answers
C.
Certified equipment(like 802. 1X switch)As RADIUS On the server side, the user terminal acts as RADIUS Client.
C.
Certified equipment(like 802. 1X switch)As RADIUS On the server side, the user terminal acts as RADIUS Client.
Answers
D.
Agile Controller-Campus As RADIUS Server side, authentication device(like 802.1X switch)As RADIUS Client.
D.
Agile Controller-Campus As RADIUS Server side, authentication device(like 802.1X switch)As RADIUS Client.
Answers
Suggested answer: D

Install Agile Controller-Campus Which of the following steps do not need to be completed before?

A.
Install the operating system
A.
Install the operating system
Answers
B.
Install the database
B.
Install the database
Answers
C.
Install antivirus software
C.
Install antivirus software
Answers
D.
Import License
D.
Import License
Answers
Suggested answer: D
Total 367 questions
Go to page: of 37