Exam:H12-724
1.Businessaccompanyingis-Aspecialaccesscontrolmethod,accordingtotheuser'saccesslocation, accesstime,accessmethodandterminalusetograntdesignatedinvestmentlimits,amongwhichthe physicalconnectioncanbedividedinto3Class,excludingwhichofthefollowingaccessmethods?
AWiredaccess
BWirelessaccess
CVPNAccess
D8021XAccess
Answer:D
2Whichofthefollowingfilescanthesandboxdetect?(multiplechoice)
Awwwfile
B.PEfile
CPicturefile
D.Mail
Answer:A,B,C
3ViewontheswitchAgileController-CampusThepolicyissuedbytheserverisasfollows: Forthisstrategy,whichofthefollowingoptionsarecorrect?(Multiplechoice)
ACommonuserUserscanaccessInternetwwwH
BVIPUserscanaccessInternetwH
CVIPCanvisitMailServerH
DCommonuserUserscanaccessMailSeverresource
Answer:B,C,D
4Identityauthenticationdetermineswhethertoallowaccessbyidentifyingtheidentityoftheaccess deviceoruser
ATrue
BFalse
Answer:A
5.RegardingtheenhancedmodeinHTTPFloodsourceauthentication,whichofthefollowingdescriptions arecorrect?Multiplechoices
A.Enhancedmodereferstotheauthenticationmethodusingverificationcode.
BSomebotshavearedirectionfunction,orthefreeproxyusedduringtheattacksupportstheredirection function,whichleadstothefailureofthebasicmodeofdefenseEffective,enhancedmodecaneffectively defend
CTheenhancedmodeissuperiortothebasicmodeintermsofuserexperience
DEnhancedmodesupportsallHTTPFloodsourceauthenticationfields"
Answer:A,B
6Cloudsandboxreferstodeployingthesandboxinthecloudandprovidingremotedetectionservicesfor tenants
Theprocessincludes:
1Reportsuspiciousfiles
2.Retrospectiveattack
3Firewalllinkagedefense
4.Prosecutioninthecloudsandbox
Fortheorderingoftheprocess,whichofthefollowingoptionsiscorrect?
A1-3-4-2
B1-4-2-3
C1-4-3-2
D3-1-4-2:
Answer:C
7Thefollowingisthe8021Xaccesscontrolswitchconfiguration:
[S5720]dot1xauthentication-methodeap
[S5720-GigabitEthernet0/0/1]portlink-typeaccess
[S5720-GigabitEthemet0/0/1]portdefaultvlan11
[S5720-GigabitEthernet0/0/1]authenticationdot1x
AssumingthatGE0/0/1isconnectedtouser1anduser2throughtheHUB,whichofthefollowingoptions iscorrect?
A.Afteruser1isauthenticated,user2canaccessnetworkresourceswithoutauthentication
BUser1andUser2mustbeindividuallyauthenticatedbeforetheycanaccessnetworkresources
CGE0/0/1doesnotneedtoenabledot1X
DNeitheruser1noruser2canpasstheauthenticationandaccessnetworkresources
Answer:A
8TianyuNeiansweredtheroleofsafetyfilteringtechnology,whichofthefollowingisstillcorrect? (multiplechoice)
AFilefilteringcanreducetheriskofmaliciouscodeexecutionandvirusinfectionintheinternalnetwork byblockingthetransmissionoffixedtypesoffiles,anditcanalsopreventPreventemployeesfrom leakingcompanyconfidentialdocumentstotheInternet
B.Contentfilteringcanpreventthedisclosureofconfidentialinformationandthetransmissionofillegal information
C.TheapplicationbehaviorcontrolfunctioncanfinelycontrolcommonHTTPbehaviorsandFTP behaviors
D.Mailfilteringreferstothemanagementandcontrolofmailsendingandreceiving,includingpreventing thefloodingofspamandanonymousemails,andcontrollingthesendingandreceivingofillegalemails
Answer:A,B,C,D
9Inthesecurityprotectionsystemofthecloudera,reformsneedtobecarriedoutinthethreestages before,duringandaftertheevent,andaclosed-loopcontinuousimprovementshouldbeformed
Anddevelopment
Whichofthefollowingkeypointsshouldbedonein"things"?(multiplechoice)
AVulnerabilityintelligence
BDefenseinDepth
COffensiveanddefensivesituation
DFightbackagainsthackers
Answer:B,D
10.InthescenarioofSACGlinkageinbypassmode,onlythetrafficinitiatedbytheterminaluserwillpass throughthefirewall,andtheserverwillreturntotheterminalinuse
ThetrafficdoesnotneedtogothroughthefirewallyForthefirewall,itbelongstothescenarioof inconsistenttrafficbackandforthpaths,thisneedstoturnoffthesessionstatecheckfunction
ATrue
BFalse
Answer:A
11DeployedbyanenterprisenetworkmanagerAgileController-CampuswithSACGLater;Identity authenticationissuccessfulbutcannotaccessthepost-authenticationdomain,Thisphenomenonmaybe causedbyanyreason?(Multiplechoice)
A.Aseriousviolationwillprohibitaccesstothepost-authenticationdomain.
BTheaccesscontrollistofthepost-authenticationdomainhasnotbeendeliveredSACG
C.ALCThenumberofrulesissuedistoomany,andalotoftimeisrequiredtomatch,causinginterruption ofaccessservices
D.AgileController-CampusWrongpost-authenticationdomainresourcesareconfiguredontheserver.
Answer:A,B,D
12Intheconstructionofinformationsecurity,theintrusiondetectionsystemplaystheroleofamonitorIt monitorstheflowofkeynodesintheinformationsystem
In-depthanalysistodiscoversecurityincidentsthatareoccurring Whichofthefollowingareitscharacteristics?
AIDScanbelinkedwithfirewallsandswitchestobecomeapowerful"assistant"offirewalls,whichcan betterandmoreaccuratelycontrolaccessbetweendomains
BItisimpossibletocorrectlyanalyzethemaliciouscodedopedintheallowedapplicationdatastream CUnabletodetectmaliciousoperationsormisoperationsfrominternalkillings
D.Cannotdoin-depthinspection
Answer:A
13WhichwaycanNACAgentupgradepackagebedeployed?
A.ByIPaddresses
BByterminaltype
C.Byaccount
DByuserinformation
Answer:A
14Whichofthefollowingisthecorrectconfigurationideafortheanti-virusstrategy?
1Loadthefeaturelibrary
2ConfiguresecuritypolicyandreferenceAVProfile
3Applyandactivatethelicense
4ConfigureAVProfile
5Submit
A.3->1->4->2->5
B3->2->4->1->5
C.3->2->1->4->5
D3->1->2->4->5
Answer:A
15WhichofthefollowingisthedefaultportnumberofPortalauthenticationservice?
A1812
B1813
C50200
D50300
Answer:A,C
16.RegardingWLAN,whichofthefollowingdescriptionsiscorrect?
AWLANIstoadopt80211TechnicalWiFi
B.WLANTherearetwobasicarchitectures:FATAPwithAC+FITAP
CAC+FATAPThearchitectureissuitableformediumandlargeusescenarios
D.AC+FITAPAutonomousnetworkarchitecture
Answer:B
17IftheprocessingstrategyforSMTPvirusfilesissettoalert,whichofthefollowingoptionsiscorrect?
AGeneratelogsanddiscard
BGeneratelogsandforwardthem
CDeletethecontentoftheemailattachment
DAddannouncementandgeneratelog
Answer:B
18Whichofthefollowingoptionsbelongtotheupgrademethodoftheanti-virussignaturedatabaseof HuaweiUSG6000products?(multiplechoice)
ALocalupgrade
B.Manualupgrade
COnlineupgrade
D.Automaticupgrade
Answer:A,C