New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-723_V3.0 Questions and Answers

Question # 6

When using local guest account authentication, usually use(Portal The authentication method pushes the authentication page to the visitor. Before the user is authenticated, when the admission control device receives the HTTP The requested resource is not Portal Server authentication URL When, how to deal with the access control equipment.

A.

Discard message

B.

URL Address redirected to Portal Authentication page

C.

Direct travel

D.

Send authentication information to authentication server

Full Access
Question # 7

In order to increase AP The security can be AC Going online AP Perform authentication. Currently Huawei AC What are the supported authentication methods? (Multiple choice)

A.

MAC Certification

B.

Password authentication

C.

Not certified:

D.

SN Certification

Full Access
Question # 8

Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?

A.

Directly discard data sent by devices that do not comply withregulations

B.

Certification of non-compliant equipment.

C.

Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.

D.

Send alarm information to notify the administrator to deal with it.

Full Access
Question # 9

For the terminal Wi-Fi The order of the push, which ofthe following is correct?

1. Any Office Mobile office system push Wi-Fi Configuration

2. Any Office The mobile office department automatically applies for a certificate.

3. The administrator configures the enterprise Wi-Fi Push.

4. The terminal automatically connects to the enterprise Wi-Fi.

A.

1-2-3-4

B.

4-2-3-1

C.

3-2-1-4

D.

2-3-1-4

Full Access
Question # 10

In theAgile Controller-Campus admission control scenario, regarding the role description of the RADIUS server I client, which of the following is positive True?

A.

Agile Controller-Campus Integrated RADIUS All functions of server and client."

B.

Agile Controller-Campus As RADIUS On the server side, the user terminal acts as RADIUS Client.

C.

Certified equipment(like 802. 1X switch)As RADIUS On the server side, the user terminal acts as RADIUS Client.

D.

Agile Controller-Campus As RADIUS Server side, authentication device(like 802.1X switch)As RADIUS Client.

Full Access
Question # 11

In the WLAN wireless access scenario, which of the following network security technologies belong to user access security? (Multiple choice)

A.

AP Certification

B.

Linkauthentication

C.

User access authentication

D.

data encryption

Full Access
Question # 12

There are two ways for Business Manager to download patches. When using hierarchical deployment, you can download patches directly from the management center or through Microsoft patches Server download patch.

A.

True

B.

False

Full Access
Question # 13

In some scenarios, ananonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)

A.

The use of anonymous accounts for authentication is based on the premise of trusting the other party, and the authentication agency does not need the other party to provide identity information to provide services to the other party.

B.

Agile Controller-Campus Need to be manually created"~anonymous"account number.

C.

By default, the access control andpolicy of anonymous accounts cannot be performed. 1 Operations such as invoking patch templates and software distribution.

D.

Administrators cannot delete anonymous accounts"~anonymous*.

Full Access
Question # 14

Regarding asset management, which of the following descriptions is wrong?

A.

Asset management can register assets automatically or manually.

B.

Enable the automatic asset registration mode, the asset registration process does not require end users to participate.

C.

Automatic registration of assets is suitable for situations where the asset number is automatically maintained by the business manager.

D.

Manually registering assets means that the administrator I Way to create an asset record on the business manager, and put the asset number in Any Office Enter it to complete the asset registration

process.

Full Access
Question # 15

In the visitor reception hall of a company, there are manytemporary terminal users, and the administrator hopes that users do not need to provide any account numbers and passwords. access Internet. Which of the following authentication methods can be used for access?

A.

Local account authentication

B.

Anonymous authentication

C.

AD Account Verification

D.

MAC Certification

Full Access
Question # 16

Use the command on the switch to view the status of free mobility deployment, the command is as follows:

For the above command, which of the following descriptionsis correct?

A.

The control server address is 10.1.10.34

B.

The authentication device address is 10.1.31.78

C.

Status is"Working"Indicates that the switch and Controller Linkage is successful

D.

current Controller The server is backup n

Full Access
Question # 17

Agile Controller-Campus All components are supported Windows System and Linux system.

A.

True

B.

False

Full Access
Question # 18

Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?

A.

Different places can have different security policies.

B.

The location has nothing to do with safety.

C.

There can only be one place in the company.

D.

Place and location have nothing to do.

Full Access
Question # 19

If youdeploy Free Mobility, in the logic architecture of Free Mobility, which of the following options should be concerned by the administrator?

A.

Is the strategy automatically deployed?

B.

Choose the appropriate policy control point and user authentication point

C.

Does the strategy deployment target a single user?

D.

Does the strategy deployment target a single department?

Full Access
Question # 20

About the hardware SACG Certification deployment scenarios, which of the following descriptions are correct? (Multiple choice)

A.

SACG Authentication is generally used in scenarios where a stable network performs wired admission control.

B.

SACG Authentication is generally used in scenarios where new networks are used for wireless admission control.

C.

SACG It is generally deployed in a bypass mode without changing the original network topology.

D.

SACG Essentially through 802.1X Technology controls access users.

Full Access
Question # 21

Which of the following equipment is suitable for use MAC Authentication access network?

A.

Office Windows Systemhost

B.

For testing Linux System host

C.

Mobile client, such as smart phone, etc

D.

Network printer 232335

Full Access
Question # 22

The user access security solution is one-kind"End to end"Security architecture. The user access security architecture includes three key components:Terminal equipment, network access equipment and access server.

A.

True

B.

False

Full Access
Question # 23

Which of the following options is for Portal The description of the role of each role in the authentication system is correct?

A.

The client is Any 0fice software.

B.

Portal The role of the server is to receive client authentication requests, provide freeportal services and authentication interfaces, and exchange client authentication information with access devices.

C.

RADIUS The role of the server is to authenticate all the users in the network segment HTTP Requests are redirected to Portal server.

D.

The role of admission control equipment is to complete the authentication, authorization and accounting of users.

Full Access
Question # 24

When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?

A.

When adding accounts individually, you can choose to create them individually.

B.

If there are a lot of users, you can choose to create in batches.

C.

If there are many users, you can choose database synchronization

D.

In order to facilitate management andimprove user experience, self-registration can be used.

Full Access
Question # 25

Agile Controller-Campus The system can manage the software installed on the terminal, define the black and white list of software, and assist the terminal to install necessary software and uninstall the software that is not allowed to be installed by linking with the access control equipment,Regarding the definition of black and white lists, which of the following statements is correct?

A.

Check for prohibited software licenses and sub-licensed software

B.

Check for prohibited software

C.

Check for prohibited software and software that must be installed

D.

Check the software that must be installed

Full Access