Huawei H12-723_V3.0-ENU HCIP-Security-CTSS V3.0 Online Training
Huawei H12-723_V3.0-ENU Online Training
The questions for H12-723_V3.0-ENU were last updated at Jan 28,2025.
- Exam Code: H12-723_V3.0-ENU
- Exam Name: HCIP-Security-CTSS V3.0
- Certification Provider: Huawei
- Latest update: Jan 28,2025
After the user is authenticated successfully, which of the following actions can be performed on the user on the Agile Controller-Campus? (Multiple Choice)
- A . Provide remote assistance to users who use Any Office access.
- B . Force users to go offline.
- C . Audit the user’s online and offline records.
- D . Deactivate/disable and assign roles to mobile certificate accounts.
In Portal authentication, which of the following parameters must be configured on the switch? (Multiple Choice)
- A . Portal server IP
- B . Portal page URL
- C . shared-key
- D . Portal protocol version
The terminal uses Portal authentication to access the network, but cannot jump to the authentication page. The possible reasons do not include which of the following options?
- A . The Portal authentication parameters configured on the Agile Controller-Campus are inconsistent with the access control device.
- B . The authentication port number configured in the Portal template of the access device is 50100, which is the default on the Agile Controller-Campus.
- C . SC does not start.
- D . When the page is customized, the preset template is used.
Which of the following options describes the SACG launch process incorrectly?
- A . The communication between the terminal and the Agile Controller-Campus server adopts SSL encryption
- B . Authentication fails, end users can only access resources in the domain before authentication
- C . If the security check is passed, the Agile Controller-Campus server notifies SACG to switch the IP address of the end user to the isolation domain
- D . The message from the Agile Controller-Campus server to the SACG carries the domain parameters
The traditional access authority control strategy is implemented through ACI or VLAN, which cannot be decoupled from the IP address, and the maintenance workload is heavy when the IP address changes. The agile network can achieve decoupling from IP addresses because of the introduction of the concept of security groups.
- A . True
- B . False
When using the test-aaa command on the access control device to test the connectivity with the Radius server, the running result shows a timeout, which may be caused by incorrect account or password configuration.
- A . True
- B . False
When the Agile Controller-Campus acts as a RADIUS server for authentication, what ports need to be configured for authentication on the admission control device?
- A . 1812
- B . 1813
- C . 8443
- D . 8080
Which of the following options is not a challenge posed by mobile office?
- A . The mobile office platform is safe, reliable and quick to go online.
- B . Users can access the network safely and quickly.
- C . Unified management of terminals and refined control.
- D . Deployment of Network Gateways.
In the Windows environment, after the Agile Controller-Campus is successfully installed, how to manually start the Management Center (MC)? (Multiple Choices)
- A . Double-click the "Start Server" shortcut on the desktop to start it.
- B . Choose Start > All Programs > Huawei > MCServer > Start Server.
- C . Choose Start > All Programs > Huawei > Agile Controller > Server Startup Config to manually start the required components.
- D . Choose Start > All Programs > Huawei > MCServer > Server Startup Config to manually start the required components.
When configuring the antivirus software policy, if you set the "Violation Level of Antivirus Software Required for Not Installed or Not Running" to "Normal", and check the "Prohibit access to the network if serious violations occur" option.
When a user uses Any office for authentication and the authentication is passed, but the security check shows that the anti-virus software is not enabled, can the user access the network?
- A . Can access the network and access network resources.
- B . Can not access the network.
- C . The network can be accessed, but it needs to be repaired before accessing network resources.
- D . Can access the network, but requires re-authentication to access network resources.