최신 HCIP-Security H12-724 무료샘플문제:
1. Regarding the identity authentication method and authentication type, which of the following descriptions is correct?
A) User passed web Agent The method can support two authentication types: digital certificate authentication and local authentication.
B) User passed web Agent The method can support two authentication types: digital certificate authentication and system authentication.
C) User passed web The method can support two authentication types: local authentication and digital certificate authentication.
D) User passed Agent The method can support three authentication types: local authentication, digital certificate authentication and system authentication.
2. In the terminal host check strategy, you can check whether the important subkeys and key values of the registry meet the requirements to control the terminal host's Access, which of the following check results will be recorded as violations? (multiple choice)
A) The registry does not contain any prohibited by this policy"Subkeys and key values"
B) The registry contains the mandatory requirements of the policy"Subkeys and key values",
C) The registry contains the prohibited"Subkeys and key values"W
D) The registry does not contain the mandatory requirements of the policy"Subkeys and key values".
3. When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy level represents the number of times the packet can be decrypted.
A) True
B) False
4. Which of the following options is not a challenge brought by mobile office?
A) Network gateway deployment
B) The mobile office platform is safe and reliable and goes online quickly.
C) Users can access the network safely and quickly.
D) Unified terminal management and fine control.
5. Huawei USG6000 products can scan and process certain file transfer protocols for viruses, but which of the following protocols is not included?
A) POP3
B) TFTP
C) FTP
D) IMAP
질문과 대답:
질문 # 1 정답: D | 질문 # 2 정답: C,D | 질문 # 3 정답: B | 질문 # 4 정답: A | 질문 # 5 정답: B |