In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?
A. DHCP
B. CAPWAP
C. ARP
D. 802.11MAC
正解:D
質問 2:
For the terminal Wi-Fi The order of the push, which ofthe following is correct?
1. Any Office Mobile office system push Wi-Fi Configuration
2. Any Office The mobile office department automatically applies for a certificate.
3. The administrator configures the enterprise Wi-Fi Push.
4. The terminal automatically connects to the enterprise Wi-Fi.
A. 1-2-3-4
B. 3-2-1-4
C. 2-3-1-4
D. 4-2-3-1
正解:B
質問 3:
For hardware SACC Access control, if the terminal does not pass the authentication, it can access the resources of the post-authentication domain. This phenomenon may be caused by the following reasons?
(Multiple choice)
A. Privileges are misconfigured IP
B. Authentication data flow has passed SACG filter.
C. SACG Enable the default inter-domain packetfiltering.
D. TSM No hardware is added to the system SACG equipment.
正解:A,C
質問 4:
In the park, users frequently enter and leave the wireless signal coverage area due to office needs. If youneed to ensure the user's Internet experience, after the user passes an authentication, when he accesses the network again, no important authentication is required:Which of the following authentication methods is recommended?
A. 82.1 Certification
B. MAC(prioritized
C. MAC Certification
D. Portal Certification
正解:B
質問 5:
Sort all services according to user group andaccount: By the end IP The address range is time-sharing, if it is a user group, a small terminal with an account IP Address range allocation for the same business(Chen Gongji outside business) I The business assigned to the one with the highest priority will take effect.
Which of the following is correct regarding the order of priority?
A. account>Terminal protection address range>user group
B. By the end P Address range>account number>user group
C. user group>terminal P Address range>Account
D. account>user group>terminal IP Address range
正解:A
質問 6:
Secure email is Any ffice Solution for corporate office 0A The killer application provided, it provides powerful email business capabilities and rich email strategies. For secure mail, which of the following descriptions are correct? (Multiple choice)
A. Online survey of attached documents is not supported.
B. Through the mail client, you can connect No or Exchange Mail system.
C. Support MAP4/SMTP/EAS Send and receive emails with standard protocols such as, and support real-time email push.
D. Support automatic mail transmission encryption, transmission encryption method supports a full range of IPSec/TLS protocol.
正解:B,C
質問 7:
Regarding the trigger mechanism of 802.1X authentication, which of the following descriptions is correct?
(multiple choice)
A. The authentication equipment department triggers authentication through multicast orunicast.
B. 802.1X Certification can only be done by certified equipment(like 802.1X switch)Initiate
C. 8021X The client can trigger authentication through multicast or broadcast.
D. 802.1X Authentication can only be initiated by the client.
正解:A,C
質問 8:
In some scenarios, ananonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)
A. Agile Controller-Campus Need to be manually created"~anonymous"account number.
B. The use of anonymous accounts for authentication is based on the premise of trusting the other party, and the authentication agency does not need the other party to provide identity information to provide services to the other party.
C. Administrators cannot delete anonymous accounts"~anonymous*.
D. By default, the access control andpolicy of anonymous accounts cannot be performed. 1 Operations such as invoking patch templates and software distribution.
正解:B,C
藤木** -
今日はHuaweiのH12-723_V3.0の試験を受けました。91%で合格しました。問題の重要点を理解すれば、この一つの問題集で余裕です。