New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

H12-723_V3.0 HCIP-Security-CTSS V3.0 Questions and Answers

Questions 4

There are two types of accounts on the Agile Controller-Campus: one is a local account and theother is an external account.

Which of the following is not a local account?

Options:

A.

Ordinary account

B.

Guest account

C.

Anonymous account

D.

Mobile certificate account

Buy Now
Questions 5

About the software SACG And hardware SACG Description, which of the following is correct?

Options:

A.

hardware SACG use Any Office Perform admission control.

B.

software SACG use Any Office Perform admission control.

C.

hardware SACG Thansoftware SACG cut costs.

D.

hardware SACG The security is higher.

Buy Now
Questions 6

In the park, users frequently enter and leave the wireless signal coverage area due to office needs. If youneed to ensure the user's Internet experience, after the user passes an authentication, when he accesses the network again, no important authentication is required:Which of the following authentication methods is recommended?

Options:

A.

MAC Certification

B.

82.1 Certification

C.

Portal Certification

D.

MAC(prioritized

Buy Now
Questions 7

Regarding the use of MAC authentication to access the network in the WLAN networking environment, which of the following statements is wrong en.

Options:

A.

MAC authentication does not require users toinstall any client software.

B.

The user name format used by MAC authentication is only one of MAC address user name format.

C.

MAC authentication actually uses 802 1X authentication method.

D.

MAC bypass authentication solves the situation of both 802.1xclient authentication and MAC authentication in the same network environment.

Buy Now
Questions 8

Configuring WLAN device detection can realize the monitoring of the entire network, but you need to set the working mode of the AP first, which of the following options are.

What is the working mode of AP? (multiple choice)

Options:

A.

access mode

B.

Normal mode

C.

Mixed mode

D.

Monitoring mode

Buy Now
Questions 9

In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.

The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario ofinconsistent traffic back and forth paths, this needs to turn off the session state check function.

Options:

A.

True

B.

False

Buy Now
Questions 10

Which of the following methods can be used to protect enterprise terminal security?

Options:

A.

Access control

B.

Encrypted access

C.

Business isolation

D.

Audit billing

Buy Now
Questions 11

The terminal host access control function does not take effect, the following is SACG View information on:

display right- manager role-id rule

Advanced ACL 3099 ,25 rules,not bingding with vpn-instance Ad's step is 1

rule 1000 permit ip (1280 times matched)

rule 1001 permit ip destination 172.18.11.2210 (581 times matched)

rule 1002 permit ip destination 172:18.11.2230 (77 times matched)

rule 1003 permit ip destination 172.19.0.0 0.0 255.255 (355 Book times matched)

rule 1004 deny ip (507759 times matched)

Which of the following statements is correct?

Options:

A.

172.18.11.221 It is the server of the isolation domain.

B.

The escape route wasopened.

C.

172.18.11.223 It is a post-domain server.

D.

The terminal host stream is the default ACL Blocked.

Buy Now
Questions 12

Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?

Options:

A.

Short message

B.

E-mail

C.

Web Print

D.

Voicemail

Buy Now
Questions 13

When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result showssuccess, but the user cannot Normal access, the possible reason does not include which of the following options?

Options:

A.

The access layer switch does not start EAP Transparent transmission function.

B.

wireless 02K In the scenario, the access control device isnot equipped with a security board

C.

AD The service controller is not added in the authentication scenario AD area.

D.

The user account or password is incorrectly configured.

Buy Now
Questions 14

View on the switch Agile Controller-Campus The policy issued by the server is as follows:

For this strategy, which of the following options are correct? (Multiple choice)

Options:

A.

Common_ user Users can accessInternet www H.

B.

VIP Users can access Internet w H.

C.

VIP Can visit Mail Server H.

D.

Common user Users can access Mail_ Sever resource.

Buy Now
Questions 15

Deploying on Windows platform, using SQL Server database About the HA function of Agile Cotoller-Campus, which of the following descriptions Is it correct? (multiple choice)

Options:

A.

Deployment Management Center MC Time, support HA,Provide based on Keepalived Technical HA Active/standby switchover.

B.

Deploy Business Manager SM Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.

C.

Deploy business controller 3SC Time, support HA, Provide a backup solution in resource pool mode, which needs to be deployed N+1 indivual SC

D.

Deploy the database DB Time, support HA use SQL Server Database mirroring technology requires the deployment of master DB+Mirroring DB+witness DB.

Buy Now
Questions 16

If youdeploy Free Mobility, in the logic architecture of Free Mobility, which of the following options should be concerned by the administrator?

Options:

A.

Is the strategy automatically deployed?

B.

Choose the appropriate policy control point and user authentication point

C.

Does the strategy deployment target a single user?

D.

Does the strategy deployment target a single department?

Buy Now
Questions 17

Which of the following options are correct for thedescription of visitor management? (Multiple choice)

Options:

A.

Visitor registration account can be configured to be exempt from approval

B.

Guest login can only be configured as Web Way of webpage

C.

Anonymous account authentication cannot be performed on the guest authentication page

D.

Visitor account approval information can be notified to visitors via SMS

Buy Now
Questions 18

Use on the terminalPortal The authentication is connected to the network, but you cannot jump to the authentication page. The possible reason does not include which of the following options?

Options:

A.

Agile Controller-Campus Configured on Portal The authentication parameters are inconsistent with the access control device.

B.

Access device Portal The authentication port number of the template configuration is 50100 ,Agile Controlle-Campus The above is the default.

C.

CS Did not start

D.

When the page is customized, the preset template is used.

Buy Now
Questions 19

Accordingto the different user name format and content used by the access device to verify user identity, the user name format used for MAC authentication can be changed.

There are three types. Which of the following formats is not included?

Options:

A.

MAC Address format

B.

Fixed username form

C.

DHCP Option format

D.

ARP Option format

Buy Now
Questions 20

Traditional network single--The strategy is difficult to cope with the current complex situations such as diversified users, diversified locations, diversified terminals, diversified applications, and insecure experience.

Options:

A.

True

B.

False

Buy Now
Questions 21

When configuring the antivirus software policy, if you set"The required antivirus software violation level is not installed or running"for"generally"And check"out Now serious violation of the rules prohibits access to the network"Options. When the user uses Any office Certify, The certification is passed, but the result of the security check Can the user access the network when the virus software is not turned on?

Options:

A.

Can access the network? Can also access network resources.

B.

Cannot access the network.

C.

Can pick up? The network needs to be repaired before you can access network resources.

D.

You can access the network, but you need to re-authenticate to access network resources.

Buy Now
Questions 22

In WPA2, because of the more secureencryption technology-TKIP/MIC, WPA2 is more secure than WPA.

Options:

A.

True

B.

False

Buy Now
Questions 23

Which of the following options is for Portal The statement of the gateway access process is correct?

Options:

A.

Portal gateway initiates Radius Challenge request message, including user name and password information

B.

The ACL issued by the server to the access gateway is carried in the Portal protocol message

C.

Issue policies while performing identity authentication

D.

The Portal server needs to pass the security check result to the access gateway device

Buy Now
Questions 24

Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.

Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?

Options:

A.

User domain

B.

Network domain

C.

Business domain:

D.

Attack domain

Buy Now
Questions 25

Agile Controller-Campus The system architecture belongs to C/S Architecture.

Options:

A.

True

B.

False

Buy Now
Exam Code: H12-723_V3.0
Exam Name: HCIP-Security-CTSS V3.0
Last Update: Dec 21, 2024
Questions: 169

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99