Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-723 Questions and Answers

Question # 6

In a centralized networking, the database, SM server, SC server, and AE server are all centrally installed in the corporate headquarters. This networking method is suitable. It is used for enterprises with a wide geographical distribution of users and a large number of users.

A.

right

B.

wrong

Full Access
Question # 7

When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result shows success, but the user cannot Normal access, the possible reason does not include which of the following options?

A.

The access layer switch does not start EAP Transparent transmission function.

B.

wireless 02K In the scenario, the access control device is not equipped with a security board

C.

AD The service controller is not added in the authentication scenario AD area.

D.

The user account or password is incorrectly configured.

Full Access
Question # 8

Agile Controller-Campus All components are supported Windows System and Linux system.

A.

right

B.

wrong

Full Access
Question # 9

The terminal host access control function does not take effect, the following is SACG View information on:

display right- manager role-id rule

Advanced ACL 3099 ,25 rules,not bingding with vpn-instance Ad's step is 1

rule 1000 permit ip (1280 times matched)

rule 1001 permit ip destination 172.18.11.2210 (581 times matched)

rule 1002 permit ip destination 172:18.11.2230 (77 times matched)

rule 1003 permit ip destination 172.19.0.0 0.0 255.255 (355 Book times matched)

rule 1004 deny ip (507759 times matched)

Which of the following statements is correct?

A.

172.18.11.221 It is the server of the isolation domain.

B.

The escape route was opened.

C.

172.18.11.223 It is a post-domain server.

D.

The terminal host stream is the default ACL Blocked.

Full Access
Question # 10

When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?

A.

When adding accounts individually, you can choose to create them individually.

B.

If there are a lot of users, you can choose to create in batches.

C.

If there are many users, you can choose database synchronization

D.

In order to facilitate management and improve user experience, self-registration can be used.

Full Access
Question # 11

View on the switch Agile Controller-Campus The policy issued by the server is as follows:

For this strategy, which of the following options are correct? (Multiple choice)

A.

Common_ user Users can access Internet www H.

B.

VIP Users can access Internet w H.

C.

VIP Can visit Mail Server H.

D.

Common user Users can access Mail_ Sever resource.

Full Access
Question # 12

Regarding patch management and Windows patch checking strategies, which of the following descriptions is wrong?

A.

Patch management and Windows The patch check strategy can check whether the terminal host has installed the specified Windows Make system patches.

B.

Windows Patch check strategy focuses on checking whether the terminal host is installed Windows Operating system patches.

C.

When the terminal host does not install the specified Windows When making a system patch, according to Windows The patch check policy prohibits terminal hosts from accessing the controlled network.

D.

Patch management focuses on checking whether the terminal host has installed the specified patch,Perform access control on the terminal host.

Full Access
Question # 13

Terminal security access technology does not include which of the following options?

A.

Access control

B.

safety certificate

C.

Authentication

D.

System Management

Full Access
Question # 14

When configuring the antivirus software policy, if you set"The required antivirus software violation level is not installed or running"for"generally"And check"out Now serious violation of the rules prohibits access to the network"Options. When the user uses Any office Certify, The certification is passed, but the result of the security check Can the user access the network when the virus software is not turned on?

A.

Can access the network? Can also access network resources.

B.

Cannot access the network.

C.

Can pick up? The network needs to be repaired before you can access network resources.

D.

You can access the network, but you need to re-authenticate to access network resources.

Full Access
Question # 15

Guest management is Agile Controller-Campus Important function of, regarding visitor management, which of the following statements are correct? (Multiple choice)

A.

Visitors can use their mobile phone number to quickly register an account

B.

The administrator can assign different permissions to each visitor

C.

Reception staff cannot create guest accounts

D.

There is a violation of the guest account, and the administrator cannot retrospectively

Full Access
Question # 16

When using local guest account authentication, usually use(Portal The authentication method pushes the authentication page to the visitor. Before the user is authenticated, when the admission control device receives the HTTP The requested resource is not Portal Server authentication URL When, how to deal with the access control equipment.

A.

Discard message

B.

URL Address redirected to Portal Authentication page

C.

Direct travel

D.

Send authentication information to authentication server

Full Access
Question # 17

Regarding the way SACG devices connect to the network, which of the following descriptions are correct? (multiple choice)

A.

SACG The equipment requires Layer 3 intercommunication with the terminal.

B.

SACG It is usually connected to the core switch equipment and uses policy routing to divert traffic.

C.

SACG Support hanging on non-Huawei devices.

D.

SACG Equipment requirements and Agile Controller-Campus Interoperability on the second floor.

Full Access
Question # 18

Identity authentication determines whether to allow access by identifying the identity of the access device or user.

A.

right

B.

wrong

Full Access
Question # 19

For hardware SACC Access control, if the terminal does not pass the authentication, it can access the resources of the post-authentication domain. This phenomenon may be caused by the following reasons? (Multiple choice)

A.

Authentication data flow has passed SACG filter.

B.

TSM No hardware is added to the system SACG equipment.

C.

SACG Enable the default inter-domain packet filtering.

D.

Privileges are misconfigured IP

Full Access
Question # 20

Which of the following options are relevant to Any Office The description of the solution content is correct? (Multiple choice)

A.

Provide unified and secure access to enterprise mobile applications on mobile terminals.

B.

The tunnel is dedicated and cannot be penetrated by viruses.

C.

Applications are quickly integrated and can be extended.

D.

It can be quickly integrated and docked with the enterprise application cloud platform.

Full Access
Question # 21

Configuring WLAN device detection can realize the monitoring of the entire network, but you need to set the working mode of the AP first, which of the following options are.

What is the working mode of AP? (multiple choice)

A.

access mode

B.

Normal mode

C.

Mixed mode

D.

Monitoring mode

Full Access
Question # 22

Regarding the role of each role in the Portal authentication framework, which of the following descriptions are correct? (multiple choice)

A.

The AAA server saves information such as usernames and passwords for authentication of access users.

B.

The Web server saves information such as user names and passwords for authentication of access users.

C.

The AAA server is used to push the Portal authentication page to the user.

D.

The web server is used to push the Portal authentication page to the user.

Full Access
Question # 23

Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.

A.

right

B.

wrong

Full Access
Question # 24

Import the user information of the AD server on the Agile Controller-Campus to realize the user's access authentication. If the user is in the Agile.

The user information is not found on the Controller-Campus. Which of the following actions will be performed in the next step?

A.

Straight forward to return authentication failure information.

B.

Discard user information.

C.

User 91 Information sent to AD The server performs verification.

D.

Synchronize the database again.

Full Access
Question # 25

SACG Inquire right-manager The information is as follows, which options are correct? (Multiple choice)

A.

SACG and IP Address is 2.1.1.1 The server linkage is unsuccessful.

B.

SACG The linkage with the controller is successful.

C.

main controller IP address is 1.1.1.2.

D.

main controller IP address is 2.1.1.1.

Full Access
Question # 26

User access authentication technology does not include which of the following options?

A.

Authentication

B.

Isolation repair'

C.

Security check

D.

Access control

Full Access
Question # 27

Regarding the use of MAC authentication to access the network in the WLAN networking environment, which of the following statements is wrong en.

A.

MAC authentication does not require users to install any client software.

B.

The user name format used by MAC authentication is only one of MAC address user name format.

C.

MAC authentication actually uses 802 1X authentication method.

D.

MAC bypass authentication solves the situation of both 802.1x client authentication and MAC authentication in the same network environment.

Full Access
Question # 28

A network adopts Portal Authentication, the user finds the pushed Web No username entered on the page/The place of the password. This failure may Which of the following causes?

A.

Agile Controller-Campus There is no corresponding user on.

B.

switch AAA Configuration error.

C.

The switch is not turned on Portal Function.

D.

Portal The push page on the server is wrong.

Full Access
Question # 29

Which of the statement is not correct according to following configuration?

[USG] pattern-group 6t type url

[USG-pattern-group-url-bt] pattern any bt.com

[USG] url-filter policy urlpolicy3

[USG-urlfilter-policy-urlpolicy3] blacklist enable

[USG-urlfilter-policy-urlpolicy3] whitelist enable

[USG-urlfilter-policy-urlpolicy3] blacklist group 6t

[USG] web-filter policy webpolicy3

[USG-web-filter-policy-webpolicy3] policy url-filter urlpolicy3

[USG-policy-interzone-trust-untrust-outbound] policy 3

[USG-policy-interzone-trust-untrust-outbound-3] action permit

[USG-policy-interzone-trust-untrust-outbound-3] policy source range 10.10.10.101 10.10.10.200

[USG-policy-interzone-trust-untrust-outbound-3] policy web-filter webpolicy3

A.

users of IP address 10.10.10.120 can access bt.com website

B.

users of IP address 10.10.10.199 cannot access bt.com website

C.

users of IP address 10.10.10.100 can access bt.com website

D.

users of IP address 10.10.10.220 can access bt.com website

Full Access
Question # 30

URL filtering, according to the classification of the remote or local classification, the user can create multiple urls strategy, determines the corresponding processing action in URL strategies, a URL strategy was applied to the domain, which can realize the corresponding URL filtering.

A.

TRUE

B.

FALSE

Full Access