Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

H12-723 Huawei Certified ICT Professional - Constructing Terminal Security System Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Huawei H12-723 Huawei Certified ICT Professional - Constructing Terminal Security System certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 3
Total 201 questions

A university user requirements are as follows:

1. The environmental flow is larger, two-way add up to OOOM, UTM deployed in its network node.

2. The intranet is divided into students zones, server zones, etc., users are most concerned about the security of the server area, to avoid all kinds of the threat of attack.

3. At the same time to ban students area some pornographic websites.

In UTM configured Extranet for untrust domain, Intranet for trust domain, how to deploy the UTM strategy? (Select 2 answers)

A.

can be directly under the global open AV, PS protective function, URL filtering function, then it can be realized

B.

Outbound direction only open AV, IPS protective function for server areas, protected server

C.

inboud direction only open AV, IPS protective function for server areas, protected server

D.

Outbound direction open URL filtering function for the entire campus network, and filtering of part classification website

In the Agile Controller-Campus admission control technology framework, regarding the description of RADIUS, which of the following options is correct?

A.

PADIUS Used on the client and 802.1X Information such as user names and passwords are passed between switches.

B.

PADIUS Used in 802.1X Switch and AAA Information such as user name and password are passed between servers.

C.

PADIUS Used for Portal Server pushes to users Web page.

D.

PADIUS Used for server to SACG Security policy issued by the device

Regarding the role of each role in the Portal authentication framework, which of the following descriptions are correct? (multiple choice)

A.

The AAA server saves information such as usernames and passwords for authentication of access users.

B.

The Web server saves information such as user names and passwords for authentication of access users.

C.

The AAA server is used to push the Portal authentication page to the user.

D.

The web server is used to push the Portal authentication page to the user.

By default, the device file, there is a knowledge base file in device, during the upgrade, the device will automatically update the knowledge base files and backups.

A.

TRUE

B.

FALSE

For the terminal Wi-Fi The order of the push, which of the following is correct?

1. Any Office Mobile office system push Wi-Fi Configuration

2. Any Office The mobile office department automatically applies for a certificate.

3. The administrator configures the enterprise Wi-Fi Push.

4. The terminal automatically connects to the enterprise Wi-Fi.

A.

1-2-3-4

B.

4-2-3-1

C.

3-2-1-4

D.

2-3-1-4

Agile Controller-Campus The system architecture belongs to C/S Architecture.

A.

right

B.

wrong

Which of the following options belong to a third-party server account? (Multiple choice)

A.

AD account number

B.

Mobile certificate account)

C.

Anonymous account

D.

Guest account

Which of the following statement is not correct about application and identification of knowledge base upgrade?

A.

When USG device unable to connect to the Internet, you can choose local upgrade

B.

When the USG devices can connect to the Internet, can upgrade manually and automatically

C.

The upgrade process of abnormal will not be able to return to the original Knowledge base

D.

You can configure the automatic save function, after saving the upgrade application control is configured as system configuration

Which of the following cybersecurity threats exist only in WLAN In the network?

A.

Brute force

B.

Crowd attack

C.

DoS Denial of service attack

D.

Weak IV attack

In order to increase AP The security can be AC Going online AP Perform authentication. Currently Huawei AC What are the supported authentication methods? (Multiple choice)

A.

MAC Certification

B.

Password authentication

C.

Not certified:

D.

SN Certification

URL filtering, remote classification list provided and maintained by a third-party classification servers, devices can be synchronous updated automatically or manually from third-party classification servers.

A.

TRUE

B.

FALSE

Agile Controller-Campus The system can manage the software installed on the terminal, define the black and white list of software, and assist the terminal to install necessary software and uninstall the software that is not allowed to be installed by linking with the access control equipment,Regarding the definition of black and white lists, which of the following statements is correct?

A.

Check for prohibited software licenses and sub-licensed software

B.

Check for prohibited software

C.

Check for prohibited software and software that must be installed

D.

Check the software that must be installed

Agile Controller-Campus Which deployment mode is not supported?

A.

Centralized deployment

B.

Distributed deployment

C.

Hierarchical deployment

D.

Two-machine deployment

What are the three main steps of business free deployment? (Multiple choice)

A.

Define security group

B.

Define and deploy group policies

C.

The system runs automatically

D.

Security group reported by the system

E.

Define user groups

Regarding WLAN, which of the following descriptions is correct?

A.

WLAN Is to adopt 80211 Technical WiFi

B.

WLAN There are two basic architectures: FAT AP with AC+FIT AP

C.

AC+FATAP The architecture is suitable for medium and large use scenarios

D.

AC+FITAP Autonomous network architecture

The relationship between user groups and accounts in user management is stored in a tree on the Agile Controller-Campus. An account belongs to only one user group.

Consistent with the corporate organizational structure: If the OU (OnizbonUnit) structure stored in the AD/LDAP server is consistent with the corporate organizational structure, users are stored Under 0OU, when the Agile Controller-Campus synchronizes AD/LDAP server accounts, which synchronization method can be used?

A.

Press "0U" to synchronize

B.

AO Synchronize by "group", "0U describes the organizational structure

C.

AO Press "Group" "Synchronize," "Group" Jida organization structure

D.

LDAP synchronization by "group"

The AD/LDAP account can be synchronized to the Agile Controller-Campus or not to the Agile Controller-Campus. Synchronize.

The Agile Controller-Campus can only be authorized by user group. If it is not synchronized to the Agile Controller-Campus, it can be fine-tuned based on the account.

Authorization

A.

right

B.

wrong

The terminal host access control function does not take effect, the following is SACG View information on:

display right- manager role-id rule

Advanced ACL 3099 ,25 rules,not bingding with vpn-instance Ad's step is 1

rule 1000 permit ip (1280 times matched)

rule 1001 permit ip destination 172.18.11.2210 (581 times matched)

rule 1002 permit ip destination 172:18.11.2230 (77 times matched)

rule 1003 permit ip destination 172.19.0.0 0.0 255.255 (355 Book times matched)

rule 1004 deny ip (507759 times matched)

Which of the following statements is correct?

A.

172.18.11.221 It is the server of the isolation domain.

B.

The escape route was opened.

C.

172.18.11.223 It is a post-domain server.

D.

The terminal host stream is the default ACL Blocked.

Which of the following options is right PKI The sequence description of the work process is correct?

1. PKI Entity direction CA ask CA Certificate. .

2. PKI Entity received CA After the certificate, install CA Certificate.

3. CA receive PKI Entity CA When requesting a certificate, add your own CA Certificate reply to PKI entity.

4. PKI Entity direction CA Send a certificate registration request message.

5. PKI When the entities communicate with each other, they need to obtain and install the local certificate of the opposite entity.

6. PKI Entity received CA The certificate information sent.

7. PKI After the entity installs the local certificate of the opposite entity,Verify the validity of the local certificate of the peer entity. When the certificate is valid,PC The public key of the certificate is used for encrypted communication between entities.

8. CA receive PKI The entity's certificate registration request message.

A.

1-3-5-4-2-6-7-8

B.

1-3-5-6-7-4-8-2

C.

1-3-2-7-6-4-5-8

D.

1-3-2-4-8-6-5-7

Regarding the file source set in the software management, which of the following descriptions is correct?

A.

When the file source is an internal data source, when distributing software, the business manager will only send the path of the data source of the software to be distributed to Any Office

B.

When the file source is an external data source, Any 0fce will obtain the software to be distributed.

C.

External data sources cannot distribute files from FTP-type file servers.

D.

The Microsoft Windows file sharing server uses the UNC (Universal Naming Conversion) path (beginning with "\\") to provide waiting. The path to distribute the software.

Page: 1 / 3
Total 201 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved