Huawei HCIP-Security-CTSS V3.0 認定 H12-723_V3.0 試験問題:
1. Inenterprises where terminal host access control management is relatively strict, administrators hope to bind terminal hosts and accounts to prevent terminal users from accessing the controlled network from unauthorized terminal hosts at will. Regarding thedescription of binding the terminal host and account, which of the following is correct?
A) Binding terminal hosts and accounts is onlyapplicable to terminal users through Any Office Scenarios for authentication, Not applicable Web Agent Plugins and Web The scenario where the client authenticates.
B) There are only consoles in the account binding terminal host, which cannot be configuredby the administrator.
C) When other accounts need to be authenticated on the bound terminal host, there is no need to find the asset owner who is bound for the first time to authorize themselves.
D) exist Any Office When logging in with an account for the first time, the terminal host is automatically bound to the current account, but the automatic binding process requires administrator approval
2. Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)
A) Ifend users are scattered in different regions, a centralized deployment solution is recommended.
B) If most end users areconcentrated on--Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.
C) If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.
D) If end users are scattered in different geographical locations, a distributed deployment solution is recommended.
3. Portal page push rules have priority, and the rules with higher priority are matched with the user's authentication information first. If none of the configured rules match, The default rules are used.
A) True
B) False
4. When a guest needs to access the network through an account, which of the following methods can be used to access? (Multiple choice)
A) Scan public QR code
B) Create new account
C) No authentication, no account required
D) Use existing socialmedia accounts
5. Regarding the basic principles of user access security, it is wrong not to list any description?
A) The terminal device directly interacts with the security policy server, and the terminal reports its own status information, including virus database version, operating system version, andterminal Information such as the patch version installed on the device.
B) The security policy server checks the status information of the terminal, and for terminal devices that do not meet the corporate security standards, the security policy server reissues. The authorization information is given to the access device.
C) When a terminal device accesses the network, it first authenticates the user's identity through the access device, and the access device cooperates withthe authentication server to complete the user Authentication.
D) The terminal device selects the answer to the resource to be accessed according to the result of the status check.
質問と回答:
質問 # 1 正解: A | 質問 # 2 正解: C、D | 質問 # 3 正解: A | 質問 # 4 正解: A、B、C、D | 質問 # 5 正解: D |