Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

H12-724 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H12-724 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: HCIP-Security (Fast track) V1.0
  • Last Update: Sep 12, 2025
  • Questions and Answers: 367
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H12-724 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H12-724 Practice Exam Questions with Answers HCIP-Security (Fast track) V1.0 Certification

Question # 6

Regarding the trigger mechanism of 802.1X authentication, which of the following descriptions is correct? (multiple choice)

A.

802.1X Authentication can only be initiated by the client.

B.

802.1X Certification can only be done by certified equipment(like 802.1X switch)Initiate

C.

8021X The client can trigger authentication through multicast or broadcast.

D.

The authentication equipment department triggers authentication through multicast or unicast.

Full Access
Question # 7

The following commands are configured on the Huawei firewall:

[USG] firewall defend ip-fragment enable

Which of the following situations will be recorded as an offensive behavior? (multiple choice)

A.

DF, bit is down, and MF bit is also 1 or Fragment Offset is not 0,

155955cc-666171a2-20fac832-0c042c047

B.

DF bit is 023, MF bit is 1 or Fragment Offset is not 0,

C.

DF bit is 0, and Fragment Offset + Length> 65535.

D.

The DF bit is 1, and Fragment Ofset + Length <65535.

Full Access
Question # 8

In a WLAN network, intra-group isolation and inter-group isolation can be used at the same time.

A.

True

B.

False

Full Access
Question # 9

When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result shows success, but the user cannot Normal access, the possible reason does not include which of the following options?

A.

The access layer switch does not start EAP Transparent transmission function.

B.

wireless 02K In the scenario, the access control device is not equipped with a security board

C.

AD The service controller is not added in the authentication scenario AD area.

D.

The user account or password is incorrectly configured.

Full Access
Question # 10

Which of the following is the default port number of Portal authentication service?

A.

1812

B.

1813

C.

50200

D.

50300

Full Access
Question # 11

Traditional access control policy passed ACL or VLAN Can not be achieved with IP Address decoupling, in IP The maintenance workload is heavy when the address changes. And because the agile network introduces the concept of security group, it can achieve the same IP Address decoupling.

A.

True

B.

False

Full Access
Question # 12

Regarding computer viruses, which of the following options is correct?

A.

Patching the system can completely solve the virus intrusion problem

B.

Computer viruses are latent, they may be latent for a long time, and only when they encounter certain conditions will they begin to carry out sabotage activities

C.

Computer viruses are contagious. They can spread through floppy disks and CDs, but they will not spread through the Internet.

D.

All computer viruses must be parasitic in files and cannot exist independently

Full Access
Question # 13

Which is correct about the following Policy Center troubleshooting process?

A.

Hardware fault-> connection fault-> NAC client fault-> Policy Center server fault

B.

connection fault-> Hardware fault-> NAC client fault-> Policy Center server fault

C.

Hardware fault-> connection fault-> Policy Center server fault-> NAC client fault

D.

hardware fault-> NAC client fault-> connection fault-> Policy Center server fault

Full Access
Question # 14

Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?

A.

File extension mismatch means that the file type is inconsistent with the file extension.

B.

Unrecognized file type means that the file type cannot be recognized and there is no file extension.

C.

File damage means that the file type cannot be identified because the file is damaged.

D.

Unrecognized file type means that the file type cannot be recognized, and the file extension cannot be recognized.

Full Access
Question # 15

Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?

A.

Short message

B.

E-mail

C.

Web Print

D.

Voicemail

Full Access
Question # 16

Which of the following options is not a cyber security threat caused by weak personal security awareness?

A.

Disclosure of personal information

B.

Threats to the internal network

C.

Leaking corporate information

D.

Increasing the cost of enterprise network operation and maintenance

Full Access
Question # 17

Which of the following iterations is correct for the description of the management center?

A.

The management server of the management center is responsible for the cleaning of abnormal flow, as well as the collection and analysis of business data, and storage, and is responsible for the summary

The stream is reported to the management server for report presentation.

B.

The data coking device is responsible for the cleaning of abnormal flow, the centralized management and configuration of equipment, and the presentation of business reports.

C.

The data collector and management server support distributed deployment and centralized deployment. Centralized deployment has good scalability.

D.

The management center is divided into two parts: management server and teaching data collector.

Full Access
Question # 18

In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?

A.

DHCP

B.

ARP

C.

CAPWAP

D.

802.11MAC

Full Access
Question # 19

When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?

A.

Planting malware

B.

Vulnerability attack

C.

Web application attacks

D.

Brute force

Full Access
Question # 20

Mobile smartphone, tablet PC users through Any Office Client and AE Establish IPSec Encrypted tunnel, After passing the certification and compliance check, visit the enterprise business.

A.

True

B.

False

Full Access
Question # 21

Regarding scanning and snooping attacks, which of the following descriptions is wrong?

A.

Scanning attacks include address scanning and port scanning.

B.

It is usually the network detection behavior before the attacker launches the real attack.

155955cc-666171a2-20fac832-0c042c0424

C.

The source address of the scanning attack is real, so it can be defended by adding direct assistance to the blacklist.

D.

When a worm virus breaks out, it is usually accompanied by an address scanning attack, so scanning attacks are offensive.

Full Access
Question # 22

Agile Controller-Campus The system architecture belongs to C/S Architecture.

A.

True

B.

False

Full Access
Question # 23

Regarding the processing flow of file filtering, which of the following statements is wrong?

A.

After the file decompression fails, the file will still be filtered. .

B.

The application identification module can identify the type of application that carries the file.

C.

Protocol decoding is responsible for analyzing the file data and file transmission direction in the data stream.

D.

The file type recognition module is responsible for identifying the true type of the file and the file extension based on the file data

Full Access
Question # 24

Anti-DDoS defense system includes: management center, detection center and cleaning center.

A.

True

155955cc-666171a2-20fac832-0c042c0421

B.

False

Full Access
Question # 25

Viruses can damage computer systems. v Change and damage business data: spyware collects, uses, and disperses sensitive information of corporate employees.

These malicious pastoral software seriously disturb the normal business of the enterprise. Desktop anti-disease software can solve the problem of central virus and indirect software from the overall situation.

A.

True

B.

False

Full Access
Question # 26

Regarding the file filtering technology in the USG6000 product, which of the following options is wrong?

A.

It can identify the application that carries the file, the file transfer direction, the file type and the file extension.

B.

Even if the file type is modified, it can also identify the true type of the file

C.

It can identify the type of files transmitted by itself, and can block, alert and announce specific types of files.

D.

It supports filtering the contents of compressed files after decompression. "

Full Access
Question # 27

Which of the following are typical intrusions? "Multiple choice)

A.

Computer is infected by U disk virus

B.

Abnormal power interruption in the computer room

C.

Tampering with Web pages

D.

Copy/view sensitive data

Full Access
Question # 28

In Portal authentication, which of the following parameters must be configured on the switch? (Multiple choice)

A.

Portal server IP

B.

Portal page URL

C.

shared-key

D.

Portal Protocol version

Full Access
Question # 29

Regarding the sequence of the mail transmission process, which of the following is correct?

1. The sender PC sends the mail to the designated SMTP Server.

2. The sender SMTP Server encapsulates the mail information in an SMTP message and sends it to the receiver SMTP Server according to the destination address of the mail

3. The sender SMTP Server encapsulates the mail information in an SMTP message according to the destination address of the mail and sends it to the receiver POP3/MAP Senver

4. The recipient sends an email.

A.

1->2->3

B.

1->2->4,

C.

1->3->2

D.

1->4->3

Full Access
Question # 30

There are several steps in a stored XSS attack

?The attacker hijacks the user session

?The attacker submits an issue containing known JavaScript

?User login

?The user requests the attacker's question 5

?The server responds to the attacker’s JavaScript

? The user's browser sends a session token to the attacker

?The attacker's JavaScript is executed in the user's browser

For the ordering of these steps, which of the following options is correct?

A.

???????

B.

???????

C.

???????

155955cc-666171a2-20fac832-0c042c0428

D.

???????

Full Access
Question # 31

Agile Controller-Campus All components are supported Windows System and Linux system.

A.

True

B.

False

Full Access
Question # 32

In the Policy Center strategy configuration, how many violations rating of definition are there?

A.

2

B.

3

C.

4

D.

5

Full Access
Question # 33

The configuration command to enable the attack prevention function is as follows; n

[FW] anti-ddos syn-flood source-detect

[FW] anti-ddos udp-flood dynamic-fingerprint-learn

[FW] anti-ddos udp-frag-flood dynamic fingerprint-learn

[FW] anti-ddos http-flood defend alert-rate 2000

[Fwj anti-ddos htp-flood source-detect mode basic

Which of the following options is correct for the description of the attack prevention configuration? (multiple choice)

A.

The firewall has enabled the SYN Flood source detection and defense function

B.

The firewall uses the first packet drop to defend against UDP Flood attacks.

C.

HTTP Flood attack defense uses enhanced mode for defense

D.

The threshold for HTTP Flood defense activation is 2000.

Full Access
Question # 34

Free mobility is a special access control method, according to the user’s access location, access time, access method and terminal authorization instructions. Set permissions, as long as the user’s access conditions remain unchanged, the permissions and network experience after accessing the network--To q

A.

True

B.

False

Full Access
Question # 35

Regarding WLAN, which of the following descriptions is correct?

A.

WLAN Is to adopt 80211 Technical WiFi

B.

WLAN There are two basic architectures: FAT AP with AC+FIT AP

C.

AC+FATAP The architecture is suitable for medium and large use scenarios

D.

AC+FITAP Autonomous network architecture

Full Access
Question # 36

Abnormal detection is to establish the normal behavior characteristic profile of the system subject through the analysis of the audit data of the system: check if the audit data in the system

If there is a big discrepancy with the normal behavior characteristics of the established subject, it is considered an intrusion. Nasu must be used as the system subject? (multiple choice)

A.

Host

B.

A group of users

C.

Single user

D.

A key program and file in the system

Full Access
Question # 37

Which of the following options is correct for the description of the Anti DDoS system configuration?

A.

Configure drainage and re-injection on the testing equipment.

B.

Configure port mirroring on the cleaning device.

C.

Add protection objects on the management center.

D.

Configure drainage and re-injection on the management center.

Full Access
Question # 38

Which of the following behaviors is a false positive of the intrusion detection system?

A.

Unable to detect new types of worms

B.

The process of trying to log in to the system is recorded

C.

Use Ping to perform network detection and be alerted as an attack

D.

Web-based attacks are not detected by the system

Full Access
Question # 39

Terminal security access technology does not include which of the following options?

A.

Access control

B.

safety certificate

C.

Authentication

D.

System Management

Full Access
Question # 40

In WPA2, because of the more secure encryption technology-TKIP/MIC, WPA2 is more secure than WPA.

A.

True

B.

False

Full Access
Question # 41

Visitor management can authorize visitors based on their account number, time, location, terminal type, access method, etc., and can also push personalized pages to visitors based on time, location, and terminal type.

A.

True

B.

False

Full Access
Question # 42

For special message attacks, which of the following option descriptions is correct?

A Special control packet attack is a potential attack and does not have direct destructive behavior

B. The attacker probes the network structure by sending special control messages to launch a real attack.

C. Special control message attacks do not have the ability to detect the network structure. Only scanning attacks can detect the network.

D. Special control message items can only use ICMP to construct attack messages.

Full Access
Question # 43

In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.

In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O

A.

IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.

B.

It is impossible to correctly analyze the malicious code doped in the allowed application data stream.

C.

Unable to detect malicious operations or misoperations from internal killings.

D.

Cannot do in-depth inspection

Full Access
Question # 44

Visitors can access the network through their registered account. Which of the following is not an account approval method?

A.

Exemption from approval

B.

Administrator approval

C.

Receptionist approval

D.

Self-approved by visitors

Full Access
Question # 45

The AD/LDAP account can be synchronized to the Agile Controller-Campus or not to the Agile Controller-Campus. Synchronize.

The Agile Controller-Campus can only be authorized by user group. If it is not synchronized to the Agile Controller-Campus, it can be fine-tuned based on the account.

Authorization

A.

True

B.

False

Full Access
Question # 46

The results of the RBL black and white list query on the firewall are as follows:

H12-724 question answer

Based on the above information only, which of the following statements is correct? (multiple choice)

A.

Mail with source address 10.17.1.0/24 will be blocked

B.

Mail with source address 10.18.1.0/24 will be blocked

C.

Mail with source address 10.17.1.0/24 will be released

D.

Mail with source address 10.18.1.0/24 will be released

Full Access
Question # 47

An enterprise has a large number of mobile office employees, and a mobile office system needs to be deployed to manage the employees. The number of employees in this enterprise exceeds 2000 People, and the employees’ working areas are distributed all over the country. In order to facilitate management, which deployment method is adopted?

A.

Centralized deployment

B.

Distributed deployment

C.

Hierarchical deployment

D.

Both centralized deployment and distributed deployment are possible

Full Access
Question # 48

Which of the following options is right PKI The sequence description of the work process is correct?

1. PKI Entity direction CA ask CA Certificate. .

2. PKI Entity received CA After the certificate, install CA Certificate.

3. CA receive PKI Entity CA When requesting a certificate, add your own CA Certificate reply to PKI entity.

4. PKI Entity direction CA Send a certificate registration request message.

5. PKI When the entities communicate with each other, they need to obtain and install the local certificate of the opposite entity.

6. PKI Entity received CA The certificate information sent.

7. PKI After the entity installs the local certificate of the opposite entity,Verify the validity of the local certificate of the peer entity. When the certificate is valid,PC The public key of the certificate is used for encrypted communication between entities.

8. CA receive PKI The entity's certificate registration request message.

A.

1-3-5-4-2-6-7-8

B.

1-3-5-6-7-4-8-2

C.

1-3-2-7-6-4-5-8

D.

1-3-2-4-8-6-5-7

Full Access
Question # 49

Web Standards that come with the client and operating system 8021 The instrument client only has the function of identity authentication: It does not support the execution of inspection strategies and monitoring strategies. Any Office The client supports all inspection strategies and monitoring strategies.

A.

True

B.

False

Full Access
Question # 50

Windows in environment,Agile Controller-Campus After the installation is successful, how to manually start the management center(MC)? (Multiple choice)

A.

Double click on the desktop"Start Server"The shortcut starts.

B.

choose"Start>all programs> Huawei> MCServer> StartServer.

C.

choose"Start>all programs> Huawei> Agile Controller> Server Startup Config"To manually start the required components.

D.

choose"Start 3 all programs> Huawei> MCServer> Sever Startup Conig",Manually start the required components

Full Access
Question # 51

Use on the terminal Portal The authentication is connected to the network, but you cannot jump to the authentication page. The possible reason does not include which of the following options?

A.

Agile Controller-Campus Configured on Portal The authentication parameters are inconsistent with the access control device.

B.

Access device Portal The authentication port number of the template configuration is 50100 ,Agile Controlle-Campus The above is the default.

C.

CS Did not start

D.

When the page is customized, the preset template is used.

Full Access
Question # 52

Server Fault information collection tool Server Collector, which of the following does collected information items not include?

A.

Software and Patch

B.

sharing information and system account information

C.

System Log

D.

processes, services and startup

Full Access
Question # 53

Which of the following technology, administrators can according to business requirements, to scale to achieve load sharing of business flow?

A.

Resource pool mechanism

B.

weighting mechanism

C.

load balancing

D.

Hot Standby

Full Access
Question # 54

About the software SACG And hardware SACG Description, which of the following is correct?

A.

hardware SACG use Any Office Perform admission control.

B.

software SACG use Any Office Perform admission control.

C.

hardware SACG Than software SACG cut costs.

D.

hardware SACG The security is higher.

Full Access
Question # 55

Deploying on Windows platform, using SQL Server database About the HA function of Agile Cotoller-Campus, which of the following descriptions Is it correct? (multiple choice)

A.

Deployment Management Center MC Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.

B.

Deploy Business Manager SM Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.

C.

Deploy business controller 3SC Time, support HA, Provide a backup solution in resource pool mode, which needs to be deployed N+1 indivual SC

D.

Deploy the database DB Time, support HA use SQL Server Database mirroring technology requires the deployment of master DB+Mirroring DB+witness DB.

Full Access
Question # 56

Regarding the role of each role in the Portal authentication framework, which of the following descriptions are correct? (multiple choice)

A.

The AAA server saves information such as usernames and passwords for authentication of access users.

B.

The Web server saves information such as user names and passwords for authentication of access users.

C.

The AAA server is used to push the Portal authentication page to the user.

D.

The web server is used to push the Portal authentication page to the user.

Full Access
Question # 57

Which of the following options does not belong to the basic DDoS attack prevention configuration process?

A.

The system starts traffic statistics.

B.

System related configuration application, fingerprint learning.

C.

The system starts attack prevention.

D.

The system performs preventive actions.

Full Access
Question # 58

What are the typical technologies of anti-virus engines (multiple choice)

A.

First package detection technology

B.

Heuristic detection technology

C.

Decryption technology

D.

File reputation detection technology 5

Full Access
Question # 59

The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.

When the account is distributed to users, what stage does the distribution of the account belong to?

A.

Page customization stage

B.

Account application stage

C.

User authentication phase

D.

Audit and cancellation stage

Full Access
Question # 60

In enterprises where terminal host access control management is relatively strict, administrators hope to bind terminal hosts and accounts to prevent terminal users from accessing the controlled network from unauthorized terminal hosts at will. Regarding the description of binding the terminal host and account, which of the following is correct?

A.

exist Any Office When logging in with an account for the first time, the terminal host is automatically bound to the current account, but the automatic binding process requires administrator approval

B.

When other accounts need to be authenticated on the bound terminal host, there is no need to find the asset owner who is bound for the first time to authorize themselves.

C.

Binding terminal hosts and accounts is only applicable to terminal users through Any Office Scenarios for authentication, Not applicable Web Agent Plugins and Web The scenario where the client authenticates.

D.

There are only consoles in the account binding terminal host, which cannot be configured by the administrator.

Full Access
Question # 61

If the processing strategy for SMTP virus files is set to alert, which of the following options is correct?

A.

Generate logs and discard

B.

Generate logs and forward them

C.

Delete the content of the email attachment

D.

Add announcement and generate log

Full Access
Question # 62

Which of the following options are relevant to MAC Certification and MAC The description of bypass authentication is correct? (Multiple choice)

A.

MAC Certification is based on MAC The address is an authentication method that controls the user's network access authority. It does not require the user to install any client software.

B.

MAC Bypass authentication is first performed on the devices that are connected to the authentication 802 1X Certification;If the device is 802. 1X No response from authentication, re-use MAC The authentication method verifies the legitimacy of the device.

C.

MAC During the authentication process, the user is required to manually enter the user name or password.

D.

MAC The bypass authentication process does not MAC The address is used as the user name and password to automatically access the network.

Full Access
Question # 63

Which of the following features does Huawei NIP intrusion prevention equipment support? (multiple choice)

A.

Virtual patch

B.

Mail detection

C.

SSL traffic detection

D.

Application identification and control

Full Access
Question # 64

For hardware SACC Access control, if the terminal does not pass the authentication, it can access the resources of the post-authentication domain. This phenomenon may be caused by the following reasons? (Multiple choice)

A.

Authentication data flow has passed SACG filter.

B.

TSM No hardware is added to the system SACG equipment.

C.

SACG Enable the default inter-domain packet filtering.

D.

Privileges are misconfigured IP

Full Access
Question # 65

Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?

A.

Local reputation MD5 cache only has static cache, which needs to be updated regularly

B.

File reputation database can only be upgraded by manual upgrade

C.

File reputation is to perform virus detection by calculating the full text MD5 of the file to be tested and matching it with the local reputation MD5 cache

D.

File reputation database update and upgrade can only be achieved through linkage with sandbox

Full Access
Question # 66

Sort all services according to user group and account: By the end IP The address range is time-sharing, if it is a user group, a small terminal with an account IP Address range allocation for the same business(Chen Gongji outside business) I The business assigned to the one with the highest priority will take effect.

Which of the following is correct regarding the order of priority?

A.

account>user group>terminal IP Address range

B.

By the end P Address range>account number>user group

C.

account>Terminal protection address range>user group

D.

user group>terminal P Address range>Account

Full Access
Question # 67

For full encryption registered mobile storage devices must be formatted to normal use in not installed NAC client terminal host.

A.

TRUE

B.

FALSE

Full Access
Question # 68

Guest management is Agile Controller-Campus Important function of, regarding visitor management, which of the following statements are correct? (Multiple choice)

A.

Visitors can use their mobile phone number to quickly register an account

B.

The administrator can assign different permissions to each visitor

C.

Reception staff cannot create guest accounts

D.

There is a violation of the guest account, and the administrator cannot retrospectively

Full Access
Question # 69

In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?

A.

Long-term latency and collection of key data.

B.

Leak the acquired key data information to a third party of interest

155955cc-666171a2-20fac832-0c042c044

C.

Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.

D.

The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.

Full Access
Question # 70

A network adopts 802. 1X To authenticate access users, the access control equipment is deployed at the convergence layer, and after the deployment is completed, it is used on the access control equipment t-aa The command test is successful, but the user cannot access the network. The failure may be caused by the following reasons? (Multiple choice)

A.

The aggregation layer device is not configured RADIUS Certification template.

B.

Agile Controller-Campus The switch is not added on NAS equipment.

C.

Connect to the terminal on the device to open 802.1X Function.

D.

The Layer 2 link is used between the access device and the aggregation device, and it is not turned on 802 Instrument transparent transmission function

Full Access
Question # 71

Deployed by an enterprise network managerAgile Controller-Campus withSACG Later;Identity authentication is successful but cannot access the post-authentication domain, This phenomenon may be caused by any reason? (Multiple choice)

A.

A serious violation will prohibit access to the post-authentication domain.

B.

The access control list of the post-authentication domain has not been delivered SACG.

C.

ALC The number of rules issued is too many, and a lot of time is required to match, causing interruption of access services.

D.

Agile Controller-Campus Wrong post-authentication domain resources are configured on the server.

Full Access
Question # 72

The processing flow of IPS has the following steps;

1. Reorganize application data

2. Match the signature

3. Message processing

4. Protocol identification

Which of the following is the correct order of the processing flow?

A.

4-1-2-3

B.

1-4-2-3

C.

1-3-2-4

D.

2-4-1-3:

Full Access
Question # 73

The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.

Signs: The workflow for the WAF tamper-proof module has the following steps:.

? WAF uses the pages in the cache to return to the client;

?WAF compares the watermark of the server page content with the page content in the cache

?Store the content of the page in the cache after learning

? When the user accesses the Web page, the WAF obtains the page content of the server

?WAF starts the learning mode to learn the page content of the user's visit to the website;

For the ordering of these steps, which of the following options is correct?

A.

?????

B.

?????

C.

?????

D.

?????

Full Access
Question # 74

Regarding the file source set in the software management, which of the following descriptions is correct?

A.

When the file source is an internal data source, when distributing software, the business manager will only send the path of the data source of the software to be distributed to Any Office

B.

When the file source is an external data source, Any 0fce will obtain the software to be distributed.

C.

External data sources cannot distribute files from FTP-type file servers.

D.

The Microsoft Windows file sharing server uses the UNC (Universal Naming Conversion) path (beginning with "\\") to provide waiting. The path to distribute the software.

Full Access
Question # 75

Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?

A.

Different places can have different security policies.

B.

The location has nothing to do with safety.

C.

There can only be one place in the company.

D.

Place and location have nothing to do.

Full Access
Question # 76

Which of the following technologies can achieve content security? (multiple choice)

A.

Web security protection

B.

Global environment awareness

C.

Sandbox and big data analysis

D.

Intrusion prevention

Full Access
Question # 77

The multi-level defense system is mainly reflected in the network level and the system level. Which of the following options are used for security defense at the network level? (Multiple choice)

A.

software SACG

B.

hardware SACG

C.

802.1X switch

D.

Authentication server

Full Access
Question # 78

How to check whether the SM and SC silverware start normally after installing the Agile Controller-Campus) (multiple delivery)

A.

Open https://SM server IP:8943 in the browser, enter the account admin and the default password Changeme123, if the login is successful, it will be explained. The SIM components are normal.

B.

After logging in to SC, select Resources>Users>User Management to create a common account. Open https://SM server IP:8447 in the browser newauth, if you can successfully log in using the account created in the previous step, the SM component is normal.

C.

Open https://SC Server IP:8443 in the browser and enter the account admin and the default password Changeme123. If the login is successful, it will be explained. The SC component is normal.

D.

After logging in to SM, select Ziyuan>User>User Management, and Xinlu has a common part number. Open https://SC server IP:8447 newauth in the browser. If you can successfully log in with the account created in the previous step, it means that the SC component is Wang Chang.

Full Access
Question # 79

Huawei NIP6000 products have zero-setting network parameters and plug-and-play functions, because the interfaces and interface pairs only work on layer 2 without

Set the IP address.

A True

B. False

Full Access
Question # 80

UDP is a connectionless protocol. UDP Flood attacks that change sources and ports will cause performance degradation of network devices that rely on session forwarding.

Even the session table is exhausted, causing the network to be paralyzed. Which of the following options is not a preventive measure for UDP Flood attacks?

A.

UDP fingerprint learning

B.

Associated defense

C.

current limit

D.

First packet discarded

Full Access
Question # 81

After the user deploys the firewall anti-virus strategy, there is no need to deploy anti-virus software

A.

True

B.

False.

Full Access
Question # 82

When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?

A.

Planting malware

B.

Vulnerability attack"

C.

We6 Application Click

D.

Brute force

Full Access
Question # 83

When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.

A.

True

B.

False

Full Access
Question # 84

A network adopts Portal Authentication, the user finds the pushed Web No username entered on the page/The place of the password. This failure may Which of the following causes?

A.

Agile Controller-Campus There is no corresponding user on.

B.

switch AAA Configuration error.

C.

The switch is not turned on Portal Function.

D.

Portal The push page on the server is wrong.

Full Access
Question # 85

Which of the following files can the sandbox detect? (multiple choice)

A.

www file

B.

PE file

C.

Picture file

D.

Mail

Full Access
Question # 86

An enterprise administrator configures the Web reputation system as shown in the figure. Regarding the configuration, which of the following statements is correct?

H12-724 question answer

A.

The content in No. 2 must be configured.

B.

In addition to this page configuration, you also need to enable the firewall and sandbox linkage, otherwise the page configuration is invalid

C.

The content in No. 4 must be configured.

D.

After the configuration is completed, you need to submit the configuration to take effect.

Full Access
Question # 87

In the campus network, employees can use 802.1X, Portal,MAC Address or SACG Way to access. Use different access methods according to different needs to achieve the purpose of user access control.

A.

True

B.

False

Full Access
Question # 88

When configuring the terminal visits, we put some equipment configured exception equipment ,which of the following statements are true about the exception equipment?

A.

the exception equipment IP is not in controlled network segment.

B.

terminal in isolation domain can not access exception equipment .

C.

only through security authentication terminals can access exception equipment.

D.

through identity authentication terminals can access exception equipment.

Full Access
Question # 89

Tianyu Nei answered the role of safety filtering technology, which of the following is still correct? (multiple choice)

A.

File filtering can reduce the risk of malicious code execution and virus infection in the internal network by blocking the transmission of fixed types of files, and it can also prevent

Prevent employees from leaking company confidential documents to the Internet.

B.

Content filtering can prevent the disclosure of confidential information and the transmission of illegal information

C.

The application behavior control function can finely control common HTTP behaviors and FTP behaviors.

D.

Mail filtering refers to the management and control of mail sending and receiving, including preventing the flooding of spam and anonymous emails, and controlling the sending and receiving of illegal emails.

Full Access
Question # 90

In the Agile Controller-Campus solution, which device is usually used as the hardware SACG?

A.

router

B.

switch

C.

Firewall

D.

IPS

Full Access
Question # 91

Which of the following options is about SACG The description of the online process is wrong?

A.

Terminal and Agile Controller-Campus Server communication SSL encryption

B.

Authentication fails, end users can only access resources in the pre-authentication domain

C.

Security check passed,Agile Controller-Campus Server notification SACG Will end user's IP Address switch to isolated domain

D.

Agile Controller-Campus Server gives SACG Carrying domain parameters in the message

Full Access
Question # 92

BY00 The products and textiles provided by the history solution program cover the entire terminal network\Application and management and other fields/include: Serialization BC Equipment, paperless network system network access support, VPN Gateway, terminal security customer ladder software, authentication system, mobile device management(MDN),move eSpace UC.

A.

True

B.

False

Full Access
Question # 93

The administrator of a certain enterprise wants employees of Yangzhi to visit the shopping website during working hours. So a URL filtering configuration file is configured to divide the predefined

The shopping website in the category is selected as blocked. But employee A can still use the company's network to shop online during lunch break. Then what are the following possible reasons

some?

A.

The administrator has not set the time to vote every day from 9:00 to 18:00

B.

The shopping website does not belong to the predefined shopping website category

C.

The administrator did not submit the configuration after completing the configuration.

D.

The administrator has not applied the URL pass-through configuration file to the security policy.

Full Access
Question # 94

In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth,

Consume equipment resources?

A.

Fraggle and Smurt

B.

Land and Smurf

C.

Fraggle and Land

155955cc-666171a2-20fac832-0c042c0423

D.

Teardrop and Land35

Full Access
Question # 95

In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.

The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario of inconsistent traffic back and forth paths, this needs to turn off the session state check function.

A.

True

B.

False

Full Access
Question # 96

Regarding traditional firewalls, which of the following statements are correct? (multiple choice)

A.

Lack of effective protection against application layer threats.

B.

It cannot effectively resist the spread of viruses from the Internet to the intranet.

C.

Ability to quickly adapt to changes in threats.

D.

Unable to accurately control various applications, such as P2P, online games, etc. .

Full Access
Question # 97

Which of the following options belong to a third-party server account? (Multiple choice)

A.

AD account number

B.

Mobile certificate account)

C.

Anonymous account

D.

Guest account

Full Access
Question # 98

Regarding the use of MAC authentication to access the network in the WLAN networking environment, which of the following statements is wrong en.

A.

MAC authentication does not require users to install any client software.

B.

The user name format used by MAC authentication is only one of MAC address user name format.

C.

MAC authentication actually uses 802 1X authentication method.

D.

MAC bypass authentication solves the situation of both 802.1x client authentication and MAC authentication in the same network environment.

Full Access
Question # 99

Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment

Anti-Virus, IPS, spam detection and other equipment.

A.

True

155955cc-666171a2-20fac832-0c042c0414

B.

False

Full Access
Question # 100

URL filtering technology can perform URL access control on users according to different time objects and address objects to achieve precise management of users.

The purpose of the Internet behavior.

A.

True

B.

False

Full Access
Question # 101

The relationship between user groups and accounts in user management is stored in a tree on the Agile Controller-Campus. An account belongs to only one user group.

Consistent with the corporate organizational structure: If the OU (OnizbonUnit) structure stored in the AD/LDAP server is consistent with the corporate organizational structure, users are stored Under 0OU, when the Agile Controller-Campus synchronizes AD/LDAP server accounts, which synchronization method can be used?

A.

Press "0U" to synchronize

B.

AO Synchronize by "group", "0U describes the organizational structure

C.

AO Press "Group" "Synchronize," "Group" Jida organization structure

D.

LDAP synchronization by "group"

Full Access
Question # 102

Business accompanying is-A special access control method, according to the user's access location, access time, access method and terminal use to grant designated investment limits, among which the physical connection can be divided into 3 Class, excluding which of the following access methods?

A.

Wired access

B.

Wireless access

C.

VPN Access

D.

802.1X Access

Full Access
Question # 103

In centralized networking, database,SM server,SC server\ AE Servers are centrally installed in the corporate headquarters. This networking method is suitable for companies with a wide geographical distribution of users and a large number of users.

A.

True

B.

False

Full Access
Question # 104

There are two ways for Business Manager to download patches. When using hierarchical deployment, you can download patches directly from the management center or through Microsoft patches Server download patch.

A.

True

B.

False

Full Access
Question # 105

When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.

155955cc-666171a2-20fac832-0c042c0435

A.

True

B.

False

Full Access
Question # 106

Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.

To hide itself and the role of designated files.

A.

True

B.

False

Full Access
Question # 107

The network-based intrusion detection system is mainly used to monitor the information of the critical path of the network in real time, listen to all packets on the network, collect data, and divide

Analyze the suspicious object, which of the following options are its main features? (multiple choices)

A.

Good concealment, the network-based monitor does not run other applications, does not provide network services, and may not respond to other computers, so

Not vulnerable to attack.

B.

The monitoring speed is fast (the problem can be found in microseconds or seconds, and the host-based DS needs to take an analysis of the audit transcripts in the last few minutes

C.

Need a lot of monitors.

D.

It can detect the source address and destination address, identify whether the address is illegal, and locate the real intruder.

Full Access
Question # 108

In Huawei USG6000 products, IAE provides an integrated solution, all content security detection functions are integrated in a well-designed

In the high-performance engine. Which of the following is not the content security detection function supported by this product?

A.

Application recognition and perception

B.

URL classification and filtering

C.

Video content filtering

D.

Intrusion prevention

155955cc-666171a2-20fac832-0c042c048

Full Access
Question # 109

Which of the following statement is correct about Policy Center system client function?

A.

NAC Agent support MAC account login.

B.

Web page login for authentication and can perform checks Strategy.

C.

Web Agent login for identity certification and security certification.

D.

NAC Agent cannot be installed on Windows Vista operating system.

Full Access
Question # 110

Portal page push rules have priority, and the rules with higher priority are matched with the user's authentication information first. If none of the configured rules match, The default rules are used.

A.

True

B.

False

Full Access