New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Huawei H12-724 Practice Exam with Questions & Answers | Set: 11

Questions 101

When configuring the terminal visits, we put some equipment configured exception equipment ,which of the following statements are true about the exception equipment?

Options:
A.

the exception equipment IP is not in controlled network segment.

B.

terminal in isolation domain can not access exception equipment .

C.

only through security authentication terminals can access exception equipment.

D.

through identity authentication terminals can access exception equipment.

Huawei H12-724 Premium Access
Questions 102

A network adopts 802. 1X To authenticate access users, the access control equipment is deployed at the convergence layer, and after the deployment is completed, it is used on the access control equipment t-aa The command test is successful, but the user cannot access the network. The failure may be caused by the following reasons? (Multiple choice)

Options:
A.

The aggregation layer device is not configured RADIUS Certification template.

B.

Agile Controller-Campus The switch is not added on NAS equipment.

C.

Connect to the terminal on the device to open 802.1X Function.

D.

The Layer 2 link is used between the access device and the aggregation device, and it is not turned on 802 Instrument transparent transmission function

Questions 103

Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers

A lot of time to research and analyze and produce corresponding defense methods.

Options:
A.

True

B.

False

Questions 104

Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)

Options:
A.

The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.

B.

It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa

C.

Port mirroring needs to be configured on the management center to monitor abnormal traffic.

155955cc-666171a2-20fac832-0c042c0411

D.

The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:

Questions 105

For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. Which of the following descriptions is correct?

Options:
A.

TCP proxy means that the firewall is deployed between the client and the server. When the SYI packet sent by the client to the server passes through the firewall, the

The firewall replaces the server and establishes a three-way handshake with the client. Generally used in scenarios where the back and forth paths of packets are inconsistent.

B.

During the TCP proxy process, the firewall will proxy and respond to each SYN message received, and maintain a semi-connection, so when the SYN message is

When the document flow is heavy, the performance requirements of the firewall are often high.

C.

TCP source authentication has the restriction that the return path must be consistent, so the application of TCP proxy is not common. State "QQ: 9233

D.

TCP source authentication is added to the whitelist after the source authentication of the client is passed, and the SYN packet of this source still needs to be verified in the future.

Questions 106

Which of the following technologies can achieve content security? (multiple choice)

Options:
A.

Web security protection

B.

Global environment awareness

C.

Sandbox and big data analysis

D.

Intrusion prevention

Questions 107

Which of the following series of devices does not support the function of accompanying business?

Options:
A.

S5720HI Series Switch:

B.

AR Series router

C.

USG6000 Series firewall

D.

SVN5600 series

Questions 108

In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)

Options:
A.

Warning

B.

Block and push the page

C.

A warning dialog box pops up

D.

All access to the client is prohibited

Questions 109

In a WLAN network, intra-group isolation and inter-group isolation can be used at the same time.

Options:
A.

True

B.

False

Questions 110

If the processing strategy for SMTP virus files is set to alert, which of the following options is correct?

Options:
A.

Generate logs and discard

B.

Generate logs and forward them

C.

Delete the content of the email attachment

D.

Add announcement and generate log