Huawei H12-724-ENU HCIP-Security (Fast track) V1.0 Online Training
Huawei H12-724-ENU Online Training
The questions for H12-724-ENU were last updated at Nov 19,2024.
- Exam Code: H12-724-ENU
- Exam Name: HCIP-Security (Fast track) V1.0
- Certification Provider: Huawei
- Latest update: Nov 19,2024
The following is the 802.1X access control switch configuration:
[S5720] dot1x authentication-method eap
[S5720-GigabitEthernet0/0/1] port link-type access
[S5720-GigabitEthemet0/0/1] port default vlan 11
[S5720-GigabitEthernet0/0/1] authentication dot1x
Assuming that GE0/0/1 is connected to user 1 and user 2 through the HUB, which of the following options is correct?
- A . After user 1 is authenticated, user 2 can access network resources without authentication
- B . User 1 and User 2 must be individually authenticated before they can access network resources
- C . GE0/0/1 does not need to enable dot1X
- D . Neither user 1 nor user 2 can pass the authentication and access network resources.
Tianyu Nei answered the role of safety filtering technology, which of the following is still correct? (multiple choice)
- A . File filtering can reduce the risk of malicious code execution and virus infection in the internal network by blocking the transmission of fixed types of files, and it can also prevent Prevent employees from leaking company confidential documents to the Internet.
- B . Content filtering can prevent the disclosure of confidential information and the transmission of illegal information
- C . The application behavior control function can finely control common HTTP behaviors and FTP behaviors.
- D . Mail filtering refers to the management and control of mail sending and receiving, including preventing the flooding of spam and anonymous emails, and controlling the sending and receiving of illegal emails.
In the security protection system of the cloud era, reforms need to be carried out in the three stages before, during and after the event, and a closed-loop continuous improvement should be formed.
And development .
Which of the following key points should be done in "things"? (multiple choice)
- A . Vulnerability intelligence
- B . Defense in Depth
- C . Offensive and defensive situation
- D . Fight back against hackers
In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.
The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario of inconsistent traffic back and forth paths, this needs to turn off the session state check function.
- A . True
- B . False
Deployed by an enterprise network manager Agile Controller-Campus with SACG Later; Identity authentication is successful but cannot access the post-authentication domain, This phenomenon may be caused by any reason? (Multiple choice)
- A . A serious violation will prohibit access to the post-authentication domain.
- B . The access control list of the post-authentication domain has not been delivered SACG.
- C . ALC The number of rules issued is too many, and a lot of time is required to match, causing interruption of access services.
- D . Agile Controller-Campus Wrong post-authentication domain resources are configured on the server.
In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.
In-depth analysis to discover security incidents that are occurring .
Which of the following are its characteristics?
- A . IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.
- B . It is impossible to correctly analyze the malicious code doped in the allowed application data stream.
- C . Unable to detect malicious operations or misoperations from internal killings.
- D . Cannot do in-depth inspection
Which way can NAC Agent upgrade package be deployed?
- A . By IP addresses
- B . By terminal type
- C . By account
- D . By user information
Which way can NAC Agent upgrade package be deployed?
- A . By IP addresses
- B . By terminal type
- C . By account
- D . By user information
Which way can NAC Agent upgrade package be deployed?
- A . By IP addresses
- B . By terminal type
- C . By account
- D . By user information
Which way can NAC Agent upgrade package be deployed?
- A . By IP addresses
- B . By terminal type
- C . By account
- D . By user information