Huawei H12-724-ENU HCIP-Security (Fast track) V1.0 Online Training
Huawei H12-724-ENU Online Training
The questions for H12-724-ENU were last updated at Jan 20,2025.
- Exam Code: H12-724-ENU
- Exam Name: HCIP-Security (Fast track) V1.0
- Certification Provider: Huawei
- Latest update: Jan 20,2025
Regarding asset management, which of the following descriptions is wrong?
- A . Asset management can register assets automatically or manually.
- B . Enable the automatic asset registration mode, the asset registration process does not require end users to participate.
- C . Automatic registration of assets is suitable for situations where the asset number is automatically maintained by the business manager.
- D . Manually registering assets means that the administrator I Way to create an asset record on the business manager, and put the asset number in Any Office Enter it to complete the asset registration process.
If the regular expression is "abc. de", which of the following will not match the regular expression?
- A . abcde
- B . abcdde
- C . abclde
- D . abc+de
The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.
Or the equipment resources are exhausted .
Which of the following options is not included in traffic attack packets?
- A . TCP packets
- B . UDP packet
- C . ICMP message
- D . FTP message
Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)
- A . The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.
- B . It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa
- C . Port mirroring needs to be configured on the management center to monitor abnormal traffic.
- D . The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:
What content can be filtered by the content filtering technology of Huawei USG6000 products?
- A . File content filtering
- B . Voice content filtering
- C . Apply content filtering..
- D . The source of the video content
A policy template is a collection of several policies. In order to audit the security status of different terminal hosts and the behavior of end users, the administrator needs to customize.
The same policy template is used to protect and manage terminal hosts. Regarding the policy template, which of the following option descriptions are correct? (Multiple choice)
- A . When configuring the policy template, you can inherit the parent template and modify the parent template policy
- B . Only the strategy in the strategy template can be used, and the administrator cannot customize the strategy.
- C . You can assign a policy template to a certain network segment.
- D . If different policy templates are applied to departments and accounts, the policy template assigned to the highest priority will take effect. The priority relationship of the number is: account>department
Which of the following options are correct for the description of visitor management? (Multiple choice)
- A . Visitor registration account can be configured to be exempt from approval
- B . Guest login can only be configured as Web Way of webpage
- C . Anonymous account authentication cannot be performed on the guest authentication page
- D . Visitor account approval information can be notified to visitors via SMS
In some scenarios, an anonymous account can be used for authentication .
What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)
- A . The use of anonymous accounts for authentication is based on the premise of trusting the other party, and the authentication agency does not need the other party to provide identity information to provide services to the other party.
- B . Agile Controller-Campus Need to be manually created"~anonymous"account number.
- C . By default, the access control and policy of anonymous accounts cannot be performed.
1 Operations such as invoking patch templates and software distribution. - D . Administrators cannot delete anonymous accounts"~anonymous*.
On WIDS functional WLAN Regarding the judgment of illegal devices in the network, which of the following statements are correct? (Multiple choice)
- A . all Ad-hoc The device will be directly judged as an illegal device
- B . Not this AC Access AP Is illegal AP
- C . Not this AC Access STA Is illegal STA
- D . Not this AC Access STA, Also need to check access AP Does it contain law
Which of the following options is for Portal The description of the role of each role in the authentication system is correct?
- A . The client is Any 0fice software.
- B . Portal The role of the server is to receive client authentication requests, provide free portal services and authentication interfaces, and exchange client authentication information with access devices.
- C . RADIUS The role of the server is to authenticate all the users in the network segment HTTP Requests are redirected to Portal server.
- D . The role of admission control equipment is to complete the authentication, authorization and accounting of users.