Huawei H12-723_V3.0-ENU HCIP-Security-CTSS V3.0 Online Training
Huawei H12-723_V3.0-ENU Online Training
The questions for H12-723_V3.0-ENU were last updated at Jan 27,2025.
- Exam Code: H12-723_V3.0-ENU
- Exam Name: HCIP-Security-CTSS V3.0
- Certification Provider: Huawei
- Latest update: Jan 27,2025
In the WLAN network with the WIDS function enabled, which of the following statements are correct regarding the determination of illegal devices? (Multiple Choice)
- A . All Ad-hoc devices will be directly judged as illegal devices
- B . APs not connected to this AC are illegal APs
- C . STAs not accessed by this AC are illegal STAs
- D . It is not the STA that the AC accesses, and it is necessary to check whether the access AP is legal.
When deploying wired 802.1X authentication, if the admission control device is deployed at the aggregation layer, this deployment method has the characteristics of high security performance, many management devices, and complex management.
- A . True
- B . False
Which of the following options is correct for describing the effect of each role in the Portal authentication system?
- A . The client is Any Office software.
- B . The role of the Portal server is to receive client authentication requests, provide free portal services and authentication interfaces, and exchange client authentication information with the access device.
- C . The role of the RADIUS server is to redirect all HTTP requests from users in the authentication network segment to the Portal server.
- D . The role of the admission control device is to complete user authentication, authorization and accounting.
Which of the following options are correct for the description of MAC authentication and MAC bypass authentication? (Multiple Choice)
- A . MAC authentication is an authentication method that controls users’ network access rights based on interfaces and MAC addresses. It does not require users to install any client software.
- B . MAC bypass authentication first performs 802.1X authentication on the access authentication device. If the device does not respond to 802.1X authentication, MAC authentication is used to verify the legitimacy of the device.
- C . During the MAC authentication process, the user needs to manually enter the username or password.
- D . During the MAC bypass authentication process, the MAC address is not used as the username and password to automatically access the network.
Regarding the deployment scenarios of hardware SACG certification, which of the following descriptions are correct? (Multiple Choice)
- A . SACG authentication is generally used in the scenarios where a stable network is used for wired access control.
- B . SACG authentication is generally used in the scenario of wireless admission control of a new network.
- C . SACG is generally deployed in a bypass mode without changing the original network topology.
- D . SACG essentially controls access users through 802.1X technology.
It is difficult for a single traditional network strategy to cope with the current complex situations such as user diversification, location diversification, terminal diversification, application diversification, and insecure experience.
- A . True
- B . False
A network uses Portal authentication, and the user finds that there is no place to enter the username/password in the pushed Web page when accessing.
This failure may be caused by which of the following reasons?
- A . There is no corresponding user on Agile Controller-Campus.
- B . The switch AAA configuration is incorrect.
- C . The switch does not enable the Portal function.
- D . Push page error on Portal server.
In an agile network, users may need to access servers such as DNS, DHCP, and Portal before authentication. When the traffic of the user accessing the server passes through the firewall, the firewall queries the Agile controller-campus server for information about the agile security group corresponding to the traffic. Since the user has not passed the authentication at this time, the Agile controller-campus server will inform the firewall that the user belongs to the "Unknown Agile Security Group (Unknown)", which will cause the user’s traffic to match the "Unknown Agile Security Group (Unknown)" before the firewall refreshes the user’s identity.
As a result, the correct permissions cannot be obtained immediately after the user authentication is passed. How to solve this problem?
- A . Turn off state detection on the FW.
- B . Configure TSM on the FW.
- C . Set up the security front domain. When an unauthenticated user accesses the server in the pre-security domain, the FW directly forwards the traffic.
- D . Allow traffic to the server on the FW.
Mobile smartphone and tablet users establish an IPSec encrypted tunnel with AE through the Any Office client. After passing the authentication and compliance check, they can access the enterprise business.
- A . True
- B . False
Typical application scenarios of terminal security include: desktop management, illegal outreach and computer peripheral management.
- A . True
- B . False