Huawei H12-724-ENU HCIP-Security (Fast track) V1.0 Online Training
Huawei H12-724-ENU Online Training
The questions for H12-724-ENU were last updated at Nov 23,2024.
- Exam Code: H12-724-ENU
- Exam Name: HCIP-Security (Fast track) V1.0
- Certification Provider: Huawei
- Latest update: Nov 23,2024
Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)
- A . If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.
- B . If most end users are concentrated on–Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.
- C . If end users are scattered in different geographical locations, a distributed deployment solution is recommended.
- D . If end users are scattered in different regions, a centralized deployment solution is recommended.
Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)
- A . If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.
- B . If most end users are concentrated on–Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.
- C . If end users are scattered in different geographical locations, a distributed deployment solution is recommended.
- D . If end users are scattered in different regions, a centralized deployment solution is recommended.
Remote control and penetration
Regarding the order of these four stages, which of the following options is correct?
- A . 2-3-4-1
- B . 1-2-4-3
- C . 1-4-2-3
- D . 2-1-4-3
Configuring WLAN device detection can realize the monitoring of the entire network, but you need to set the working mode of the AP first, which of the following options are.
What is the working mode of AP? (multiple choice)
- A . access mode
- B . Normal mode
- C . Mixed mode
- D . Monitoring mode
An enterprise adopts hardware SACG access method for admission control. The configuration commands are as follows, among which Key; Admin@123
[USG] right-manager server-group
[USG-rightm] localip 10.1.10.2
[USG-rightm]serverip 10. 1.31.78 shared-key AdnIn@123
[USG2100-rightm] right-manager server-group enable.
Assuming that the other configurations are correct, based on the above configuration only, which of the following options is correct?
- A . After completing the configuration, SACG can successfully link with the Agile Controller-Campus.
- B . After completing the configuration, SACG cannot successfully link with Agile Contrlle-Campus. P
- C . Can issue pre-authentication domain ACL.
- D . The linkage cannot be successful but the terminal can access the pre-authentication domain server.
802.1X During the authentication, if the authentication point is at the aggregation switch, in addition to RADIUS,AAA,802.1X.
In addition to the conventional configuration, what special configuration is needed?
- A . Both the aggregation layer and the access layer switches need to be turned on 802.1X Function.
- B . Access layer switch needs to be configured 802. 1X Transparent transmission of messages.
- C . The aggregation switch needs to be configured 802 1X Transparent transmission of messages.
- D . No special configuration required
If the user’s FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)
- A . Block
- B . Declare
- C . Alarm
- D . Execution
Jailbroken mobile terminalMobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?
- A . Directly discard data sent by devices that do not comply with regulations
- B . Certification of non-compliant equipment.
- C . Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.
- D . Send alarm information to notify the administrator to deal with it.
When using local guest account authentication, usually use(Portal The authentication method pushes the authentication page to the visitor. Before the user is authenticated, when the admission control device receives the HTTP The requested resource is not Portal Server authentication URL When, how to deal with the access control equipment.
- A . Discard message
- B . URL Address redirected to Portal Authentication page
- C . Direct travel
- D . Send authentication information to authentication server
Sort all services according to user group and account: By the end IP The address range is time-sharing, if it is a user group, a small terminal with an account IP Address range allocation for the same business(Chen Gongji outside business) I The business assigned to the one with the highest priority will take effect.
Which of the following is correct regarding the order of priority?
- A . account>user group>terminal IP Address range
- B . By the end P Address range>account number>user group
- C . account>Terminal protection address range>user group
- D . user group>terminal P Address range>Account