Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

H12-724 HCIP-Security (Fast track) V1.0 Questions and Answers

Questions 4

Regarding the principle of MAC authentication, which of the following descriptions is wrong?

Options:

A.

MAC Certification required Portal Server cooperation.

B.

MAC Certification is passed 802.1X Implementation of the agreement.

C.

MAC Authentication requires obtaining the terminal’s MAC The address is stored in AAA server.

D.

NAS Device Configuration MAC After authentication, the terminal’s MAC The address is used as the username and password.

Buy Now
Questions 5

An account can belong to multiple roles, that is, a user may hold multiple positions.

Options:

A.

True

B.

False

Buy Now
Questions 6

The relationship between user groups and accounts in user management is stored in a tree on the Agile Controller-Campus. An account belongs to only one user group.

Consistent with the corporate organizational structure: If the OU (OnizbonUnit) structure stored in the AD/LDAP server is consistent with the corporate organizational structure, users are stored Under 0OU, when the Agile Controller-Campus synchronizes AD/LDAP server accounts, which synchronization method can be used?

Options:

A.

Press "0U" to synchronize

B.

AO Synchronize by "group", "0U describes the organizational structure

C.

AO Press "Group" "Synchronize," "Group" Jida organization structure

D.

LDAP synchronization by "group"

Buy Now
Questions 7

Regarding CAPWAP encryption, which of the following statements is wrong?

Options:

A.

CAPWAP The data tunnel can be used DTLS Encrypted.

B.

DTLS Support two authentication methods:Certificate authentication(out AC,AP Already brought)with PSK Password authentication.

C.

DTLS Encryption can guarantee AC The issued control messages will not be eavesdropped on.

D.

Use the certificate method to carry out DTLS Negotiation, the certificate is only used to generate the key, not right AP Perform authentication.

Buy Now
Questions 8

Which of the following options are the possible reasons why a certain signature is not included after the IPS policy configuration is completed? (multiple choice)

Options:

A.

Direction is not enabled

B.

The direction is turned on, but no specific direction is selected

C.

The severity level of the configuration is too high

D.

The protocol selection technique is correct

Buy Now
Questions 9

An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .

Which of the following is the entry that the firewall will match when looking up the website URL?

Options:

A.

example

B.

www. abc. example. com

C.

www.abc. example

D.

example. com

Buy Now
Questions 10

Viruses can damage computer systems. v Change and damage business data: spyware collects, uses, and disperses sensitive information of corporate employees.

These malicious pastoral software seriously disturb the normal business of the enterprise. Desktop anti-disease software can solve the problem of central virus and indirect software from the overall situation.

Options:

A.

True

B.

False

Buy Now
Questions 11

Which of the following options is not a cyber security threat caused by weak personal security awareness?

Options:

A.

Disclosure of personal information

B.

Threats to the internal network

C.

Leaking corporate information

D.

Increasing the cost of enterprise network operation and maintenance

Buy Now
Questions 12

Which of the following law items is the most blessed for safety? This should be true?

Options:

A.

Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00

B.

Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.

C.

The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.

D.

Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.

Buy Now
Questions 13

In the deployment of Huawei NIP6000 products, only port mirroring can be used for streaming replication.

Options:

A.

True

B.

False

Buy Now
Questions 14

When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?

Options:

A.

When adding accounts individually, you can choose to create them individually.

B.

If there are a lot of users, you can choose to create in batches.

C.

If there are many users, you can choose database synchronization

D.

In order to facilitate management and improve user experience, self-registration can be used.

Buy Now
Questions 15

Which way can NAC Agent upgrade package be deployed?

Options:

A.

By IP addresses

B.

By terminal type

C.

By account

D.

By user information

Buy Now
Questions 16

Regarding the file source set in the software management, which of the following descriptions is correct?

Options:

A.

When the file source is an internal data source, when distributing software, the business manager will only send the path of the data source of the software to be distributed to Any Office

B.

When the file source is an external data source, Any 0fce will obtain the software to be distributed.

C.

External data sources cannot distribute files from FTP-type file servers.

D.

The Microsoft Windows file sharing server uses the UNC (Universal Naming Conversion) path (beginning with "\\") to provide waiting. The path to distribute the software.

Buy Now
Questions 17

After an enterprise deployed antivirus software, it was discovered that virus infections still occurred on a large scale. In addition to the limitations of the product's own technology, the reason for the problem is weak personal terminal security protection, which is also an important factor.

Options:

A.

True

B.

False

Buy Now
Questions 18

Regarding the description of the logic architecture of the business accompanying, which of the following options is correct?

Options:

A.

The business management plane focuses on administrators, authentication servers, and policy servers.

B.

The network equipment plane focuses on user terminals and static resources.

C.

The user plane focuses on authentication points and policy enforcement points.

D.

The business free mobility logic architecture includes a management subsystem, an authentication and authorization subsystem, and a business strategy subsystem.

Buy Now
Questions 19

Regarding the policy for checking account security, which of the following descriptions are correct? (Multiple choice)

Options:

A.

You can check whether there is a weak password.

B.

You can check whether the account has joined a specific group.

C.

It cannot be repaired automatically._

D.

It is not possible to check whether the password length meets the requirements.

Buy Now
Questions 20

Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main

Which four major components are included?

Options:

A.

Event extraction, intrusion analysis, reverse intrusion and remote management.

B.

Incident extraction, intrusion analysis, intrusion response and on-site management.

C.

Incident recording, intrusion analysis, intrusion response and remote management.

D.

Incident extraction, intrusion analysis, intrusion response and remote management.

Buy Now
Questions 21

Which three aspects should be considered in the design of cloud platform security solutions? (multiple choice)

Options:

A.

Infrastructure security

B.

Tenant security

C.

How to do a good job in management, operation and maintenance

D.

Hardware maintenance

Buy Now
Questions 22

The processing flow of IPS has the following steps;

1. Reorganize application data

2. Match the signature

3. Message processing

4. Protocol identification

Which of the following is the correct order of the processing flow?

Options:

A.

4-1-2-3

B.

1-4-2-3

C.

1-3-2-4

D.

2-4-1-3:

Buy Now
Questions 23

Regarding traditional firewalls, which of the following statements are correct? (multiple choice)

Options:

A.

Lack of effective protection against application layer threats.

B.

It cannot effectively resist the spread of viruses from the Internet to the intranet.

C.

Ability to quickly adapt to changes in threats.

D.

Unable to accurately control various applications, such as P2P, online games, etc. .

Buy Now
Questions 24

When a guest needs to access the network through an account, which of the following methods can be used to access? (Multiple choice)

Options:

A.

Create new account

B.

Use existing social media accounts

C.

No authentication, no account required

D.

Scan public QR code

Buy Now
Questions 25

Regarding patch management and Windows patch checking strategies, which of the following descriptions is wrong?

Options:

A.

Patch management and Windows The patch check strategy can check whether the terminal host has installed the specified Windows Make system patches.

B.

Windows Patch check strategy focuses on checking whether the terminal host is installed Windows Operating system patches.

C.

When the terminal host does not install the specified Windows When making a system patch, according to Windows The patch check policy prohibits terminal hosts from accessing the controlled network.

D.

Patch management focuses on checking whether the terminal host has installed the specified patch,Perform access control on the terminal host.

Buy Now
Questions 26

In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.

"Hand in" to activate.

Options:

A.

True

B.

False

Buy Now
Questions 27

Single-packet attacks are divided into scanning and snooping attacks, malformed packet attacks, and special packet attacks. Ping of death is a special packet attack.

Options:

A.

True

B.

False

Buy Now
Questions 28

For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)

Options:

A.

HTTPS Flood defense modes include basic mode, enhanced mode and 302 redirection.

B.

HTTPS Flood defense can perform source authentication by limiting the request rate of packets.

C.

The principle of HTTPS Flood attack is to request URIs involving database operations or other URIs that consume system resources, causing server resource consumption.

Failed to respond to normal requests.

D.

The principle of HTTPS Flood attack is to initiate a large number of HTTPS connections to the target server, causing the server resources to be exhausted and unable to respond to regular requests.

begging.

Buy Now
Questions 29

A network adopts Portal Authentication, the user finds the pushed Web No username entered on the page/The place of the password. This failure may Which of the following causes?

Options:

A.

Agile Controller-Campus There is no corresponding user on.

B.

switch AAA Configuration error.

C.

The switch is not turned on Portal Function.

D.

Portal The push page on the server is wrong.

Buy Now
Questions 30

What are the typical technologies of anti-virus engines (multiple choice)

Options:

A.

First package detection technology

B.

Heuristic detection technology

C.

Decryption technology

D.

File reputation detection technology 5

Buy Now
Questions 31

The user access security solution is one-kind"End to end"Security architecture. The user access security architecture includes three key components:Terminal equipment, network access equipment and access server.

Options:

A.

True

B.

False

Buy Now
Questions 32

When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.

Options:

A.

True

B.

False

Buy Now
Questions 33

Which of the following is the default port number of Portal authentication service?

Options:

A.

1812

B.

1813

C.

50200

D.

50300

Buy Now
Questions 34

The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.

Or the equipment resources are exhausted. Which of the following options is not included in traffic attack packets?

Options:

A.

TCP packets

B.

UDP packet

C.

ICMP message

D.

FTP message

Buy Now
Questions 35

The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.

When the account is distributed to users, what stage does the distribution of the account belong to?

Options:

A.

Page customization stage

B.

Account application stage

C.

User authentication phase

D.

Audit and cancellation stage

Buy Now
Questions 36

Which of the following statement is correct about Policy Center system client function?

Options:

A.

NAC Agent support MAC account login.

B.

Web page login for authentication and can perform checks Strategy.

C.

Web Agent login for identity certification and security certification.

D.

NAC Agent cannot be installed on Windows Vista operating system.

Buy Now
Questions 37

The service free mobility function of the Agile Controller can guide the flow to the security center for processing according to the service, improving the utilization of physical equipment.

Options:

A.

True

B.

False

Buy Now
Questions 38

If you deploy Free Mobility, in the logic architecture of Free Mobility, which of the following options should be concerned by the administrator?

Options:

A.

Is the strategy automatically deployed?

B.

Choose the appropriate policy control point and user authentication point

C.

Does the strategy deployment target a single user?

D.

Does the strategy deployment target a single department?

Buy Now
Questions 39

The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?

Options:

A.

③④

B.

①③④

C.

⑤⑥

D.

②④

Buy Now
Questions 40

Which of the following methods can be used to protect enterprise terminal security?

Options:

A.

Access control

B.

Encrypted access

C.

Business isolation

D.

Audit billing

Buy Now
Questions 41

The user needs of a university are as follows:

1. The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.

2. The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.

3. At the same time, some pornographic websites in the student area are prohibited.

The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?

155955cc-666171a2-20fac832-0c042c0415

Options:

A.

You can directly turn on the AV, IRS protection functions, and URL filtering functions in the global environment to achieve the requirements

B.

To the untrust direction, only enable AV and IPS protection functions for the server zone to protect the server

C.

In the direction of untrust to the intranet, only the AV and IPS protection functions are turned on for the server area to protect the server

D.

Go to the untrust direction to open the URL filtering function for the entire campus network, and filter some classified websites

Buy Now
Questions 42

In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?

Options:

A.

DHCP

B.

ARP

C.

CAPWAP

D.

802.11MAC

Buy Now
Questions 43

The access control server is the implementer of the corporate security policy, responsible for implementing the corresponding access control in accordance with the security policy formulated by the customer's network(Allow, deny, leave or restrict).

Options:

A.

True

B.

False

Buy Now
Questions 44

Regarding HTTP behavior, which of the following statements is wrong?

Options:

A.

HTTP POST is generally used to send information to the server through a web page, such as forum posting x form submission, username I password login.

B.

When the file upload operation is allowed, the alarm threshold and blocking threshold can be configured to control the size of the uploaded file.

C.

When the size of the uploaded or downloaded file and the size of the content of the POST operation reach the alarm threshold, the system will generate log information to prompt the device management

And block behavior.

D.

When the uploaded or downloaded file size, POST operation content size reaches the blocking threshold, the system will only block the uploaded or downloaded file, POST

operate.

Buy Now
Questions 45

Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?

Options:

A.

Directly discard data sent by devices that do not comply with regulations

B.

Certification of non-compliant equipment.

C.

Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.

D.

Send alarm information to notify the administrator to deal with it.

Buy Now
Questions 46

There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: Agile Controller-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.

Options:

A.

True

B.

False

Buy Now
Questions 47

Regarding the description of the account blacklist, which of the following options is wrong?

Options:

A.

The automatic account lock and manual account lock functions cannot be activated at the same time.

B.

For automatically locked accounts, if the number of incorrect passwords entered by the terminal user during authentication exceeds the limited number of times within a limited time, the account will be automatically locked.

C.

For manually locked accounts, the administrator needs to manually add the account to the locked account list.

D.

Manually lock the account and delete it from the list, the lock of the account will be released.

Buy Now
Questions 48

The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.

Options:

A.

True

B.

False

Buy Now
Questions 49

Regarding the strategy for checking the screensaver settings, which of the following descriptions are correct? (Multiple choice)

Options:

A.

You can check whether the screen saver is enabled on the terminal

B.

You can check whether the screen saver password is enabled

C.

Only supports Windows operating system

D.

Screen saver settings cannot be automatically repaired

Buy Now
Questions 50

In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)

Options:

A.

Warning

B.

Block and push the page

C.

A warning dialog box pops up

D.

All access to the client is prohibited

Buy Now
Questions 51

When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?

Options:

A.

Deploy the main DB

B.

Deploy image DBO

C.

Deploy witness DB

D.

Deploy MC and SM dual machine backup

Buy Now
Questions 52

Which of the following options is not a challenge brought by mobile office?

Options:

A.

The mobile office platform is safe and reliable and goes online quickly.

B.

Users can access the network safely and quickly.

C.

Unified terminal management and fine control.

D.

Network gateway deployment

Buy Now
Questions 53

In the Agile Controller-Campus admission control scenario, regarding the role description of the RADIUS server I client, which of the following is positive True?

Options:

A.

Agile Controller-Campus Integrated RADIUS All functions of server and client."

B.

Agile Controller-Campus As RADIUS On the server side, the user terminal acts as RADIUS Client.

C.

Certified equipment(like 802. 1X switch)As RADIUS On the server side, the user terminal acts as RADIUS Client.

D.

Agile Controller-Campus As RADIUS Server side, authentication device(like 802.1X switch)As RADIUS Client.

Buy Now
Questions 54

The following figure shows the configuration of the URL filtering configuration file. Regarding the configuration, which of the following statements is correct?

Options:

A.

The firewall will first check the blacklist entries and then the whitelist entries.

B.

Assuming that the user visits the www.exzample.com website, which belongs to the categories of humanities and social networks at the same time, the user cannot access the

website.

C.

The user visits the website www.exzample.com, and when the black and white list is not hit, the next step is to query the predefined URL category entry.

D.

The default action means that all websites are allowed to visit. So the configuration is wrong here.

Buy Now
Questions 55

Terminal security access technology does not include which of the following options?

Options:

A.

Access control

B.

safety certificate

C.

Authentication

D.

System Management

Buy Now
Exam Code: H12-724
Exam Name: HCIP-Security (Fast track) V1.0
Last Update: May 1, 2024
Questions: 367
H12-724 pdf

H12-724 PDF

$28  $80
H12-724 Engine

H12-724 Testing Engine

$33.25  $95
H12-724 PDF + Engine

H12-724 PDF + Testing Engine

$45.5  $130