Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

H12-723 Huawei Certified ICT Professional - Constructing Terminal Security System Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Huawei H12-723 Huawei Certified ICT Professional - Constructing Terminal Security System certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 201 questions

Deployed by an enterprise network managerAgile Controller-Campus withSACG Later;Identity authentication is successful but cannot access the post-authentication domain, This phenomenon may be caused by any reason? (Multiple choice)

A.

A serious violation will prohibit access to the post-authentication domain.

B.

The access control list of the post-authentication domain has not been delivered SACG.

C.

ALC The number of rules issued is too many, and a lot of time is required to match, causing interruption of access services.

D.

Agile Controller-Campus Wrong post-authentication domain resources are configured on the server.

After an enterprise deployed antivirus software, it was discovered that virus infections still occurred on a large scale. In addition to the limitations of the product's own technology, the reason for the problem is weak personal terminal security protection, which is also an important factor.

A.

right

B.

wrong

For the convenience of visitors, different authentication and master pages can be distributed for different visitors. When configuring the push page strategy, different matching conditions need to be defined, so which of the following options can be used as the limited matching conditions? (Multiple choice)

A.

Terminal P address

B.

Location information of the access device

C.

Priority of guest accounts

D.

Connected to the network SSID'

When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?

A.

Deploy the main DB

B.

Deploy image DBO

C.

Deploy witness DB

D.

Deploy MC and SM dual machine backup

The multi-level defense system is mainly reflected in the network level and the system level. Which of the following options are used for security defense at the network level? (Multiple choice)

A.

software SACG

B.

hardware SACG

C.

802.1X switch

D.

Authentication server

Install Agile Controller-Campus Which of the following steps do not need to be completed before?

A.

Install the operating system

B.

Install the database

C.

Install antivirus software

D.

Import License

The user access security solution is one-kind"End to end"Security architecture. The user access security architecture includes three key components:Terminal equipment, network access equipment and access server.

A.

right

B.

wrong

When the account assigned by the administrator for the guest is connected to the network, the audit action that the administrator can perform on the guest does not include which of the following options?

A.

Visitor online and offline records

B.

Force users to go offline

C.

Account deactivation 1 reset Password

D.

Send a warning message to the user

Administrator creates the correct IPS strategy, applied to domain or inter-domain , but found that no matter in the IPS signature set movement is blocking or alarm, when the invasion attack, only produce the

alarm.

What is the reason for this problem?

A.

Set IPS work mode in the IPS global parameters for alarm

B.

did not select the correct domain

C.

did not configure corresponding IPS strategy

D.

configure Firewall running mode for Firewall mode

There are two types of accounts on the Agile Controller-Campus: one is a local account and the other is an external account.

Which of the following is not a local account?

A.

Ordinary account

B.

Guest account

C.

Anonymous account

D.

Mobile certificate account

Which of the following statement is correct IDS and IPS?

A.

IDS only supports Inline online deployment

B.

IPS deployed as a bypass mode is similar to the function of ID

C.

the core technology of IPS is deep packet inspection and bypass inspection

D.

With the IPS does not need to deploy a firewall and IDS

On WIDS functional WLAN Regarding the judgment of illegal devices in the network, which of the following statements are correct? (Multiple choice)

A.

all Ad-hoc The device will be directly judged as an illegal device

B.

Not this AC Access AP Is illegal AP

C.

Not this AC Access STA Is illegal STA

D.

Not this AC Access STA,Also need to check access AP Does it contain law

URL filtering, according to the classification of the remote or local classification, the user can create multiple urls strategy, determines the corresponding processing action in URL strategies, a URL strategy was applied to the domain, which can realize the corresponding URL filtering.

A.

TRUE

B.

FALSE

Business accompanying is-A special access control method, according to the user's access location, access time, access method and terminal use to grant designated investment limits, among which the physical connection can be divided into 3 Class, excluding which of the following access methods?

A.

Wired access

B.

Wireless access

C.

VPN Access

D.

802.1X Access

The traditional campus network is based on IP As the core network, if there are mobile office users, which of the following options is not the problem that mobile office users face when deploying access authentication?

A.

The user distribution range is large, and the access control requirements are high.

B.

The deployment of the access control strategy is significant.

C.

Access rights are difficult to control.

D.

User experience technology

In the terminal security all-round defense system, use PPT-PDCA The model can effectively implement terminal security defense. Which of the following options does not belong to PPT Model?

A.

technology

B.

Process

C.

organization

D.

plan

Which of the following options is for Portal The description of the role of each role in the authentication system is correct?

A.

The client is Any 0fice software.

B.

Portal The role of the server is to receive client authentication requests, provide free portal services and authentication interfaces, and exchange client authentication information with access devices.

C.

RADIUS The role of the server is to authenticate all the users in the network segment HTTP Requests are redirected to Portal server.

D.

The role of admission control equipment is to complete the authentication, authorization and accounting of users.

Which of the following law items is the most blessed for safety? This should be true?

A.

Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00

B.

Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.

C.

The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.

D.

Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.

MAC Bypass authentication means that after the terminal is connected to the network, the access control device automatically obtains the terminal MAC Address, which is sent to RADIUS The server performs euverification.

A.

right

B.

wrong

About in WLAN User isolation technology is used in the networking environment. Which of the following statements is wrong?

A.

User isolation between groups means that users in different groups cannot communicate, but internal users in the same group can communicate

B.

Isolation within a user group means that users within the same group cannot communicate with each other.

C.

The user isolation function is related to the same AP Layer 2 packets between all wireless users on the Internet cannot be forwarded to each other

D.

Intra-group isolation and inter-group isolation cannot be used at the same time

Page: 2 / 3
Total 201 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved