New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Huawei H12-724 Practice Exam with Questions & Answers

Questions 1

When the Anti DDoS system finds the attack flow, the state will redirect the attack flow to the cleaning device. After the cleaning device is cleaned, it will flow back.

Note to the original link, which of the following options does not belong to the method of re-injection?

Options:
A.

Policy routing back annotation,

B.

GRE back note:

C.

MPLS LSP back injection

D.

BGP back-annotation

Huawei H12-724 Premium Access
Questions 2

Which of the following options belong to a third-party server account? (Multiple choice)

Options:
A.

AD account number

B.

Mobile certificate account)

C.

Anonymous account

D.

Guest account

Questions 3

Which of the following signature attributes cannot be configured for IP custom signature?

Options:
A.

ID

B.

Message length

C.

Agreement

D.

Direction

Questions 4

An account can only belong to one user group, that is, a user can only belong to one department.

Options:
A.

True

B.

False

Questions 5

Which of the following options is correct for the description of the role of the isolation domain?

Options:
A.

Isolation domain refers to the area that the terminal host can access before passing the identity authentication, such as DNS server, external authentication source, business controller (SC)c The area where the service manager (SM) is located.

B.

Isolation domain refers to the area that is allowed to be accessed when the terminal user passes the identity authentication but fails the security authentication, such as patch server, virus database server. The area where the server is located.

C.

Isolation domain refers to the area that terminal users can access after passing identity authentication and security authentication, such as ERP system, financial system database system. The area where you are.

D.

End users can access the isolated domain regardless of whether they pass identity authentication.

Questions 6

Use on access control equipment test-aaa Command test and Radius When the server is connected, the running result shows a timeout, which may be caused by incorrect account or password configuration.

Options:
A.

True

B.

False

Questions 7

Portal authentication on the Agile Controller-Campus has been configured and is correct.

Configure the following commands on the access control switch:

[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255

Which of the following options are correct? (multiple choice)

Options:
A.

After the configuration is complete, the switch will automatically release the data flow to access the security controller,No need for manual configuration by the administrator.

B.

This configuration allows users to access network resources before authentication.

C.

After the configuration is complete, the administrator still needs to manually configure the release network segment

D.

Only after the authentication is passed, the terminal can access 10.1.31.78 Host.

Questions 8

Which of the following options will not pose a security threat to the network?

Options:
A.

Hacking

B.

Weak personal safety awareness

C.

Open company confidential files

D.

Failure to update the virus database in time

Questions 9

For the scenario where the authentication server adopts distributed deployment, which of the following descriptions are correct? (multiple choice)

Options:
A.

The enterprise network is relatively scattered, there are multiple branches, and the branch users are larger in scale.

B.

A scenario where there are less than 2,000 branch users, and the headquarters and branch networks are relatively stable.

C.

The terminal security management business between the branch and the headquarters is relatively independent, and the headquarters provides supervision and control over the branch terminal security management business.

D.

It is difficult to guarantee the quality of the network between the branch and the headquarters, and the network between the headquarters and the branch may be interrupted, making the terminal of the

branch no longer available.

Questions 10

Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)

A ICMP protocol

B. UDP protocol

C. CIP protocol

D. FTP protocol

Options: