Huawei H12-723 Exam
HCIP-Security-CTSS V3.0 (Page 3 )

Updated On: 1-Feb-2026

Regarding CAPWAP encryption, which of the following statements is wrong?

  1. CAPWAP The data tunnel can be used DTLS Encrypted.
  2. DTLS Support two authentication methods:Certificate authentication(out AC,AP Already brought)with PSK Password authentication.
  3. DTLS Encryption can guarantee AC The issued control messages will not be eavesdropped on.
  4. Use the certificate method to carry out DTLS Negotiation, the certificate is only used to generate the key, not right AP Perform authentication.

Answer(s): A



According to different reliability requirements, centralized networking can provide different reliability networking solutions. Regarding these solutions, which of the following descriptions are correct? (Multiple choice)

  1. Basic networking includes deploying one SM Server, one SC Server, one DB and a AE server.
  2. AE In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup SC server.
  3. SC In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup SM server.
  4. DB In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup DB..

Answer(s): A,D



Regarding the role of each role in the Portal authentication framework, which of the following descriptions are correct? (multiple choice)

  1. The AAA server saves information such as usernames and passwords for authentication of access users.
  2. The Web server saves information such as user names and passwords for authentication of access users.
  3. The AAA server is used to push the Portal authentication page to the user.
  4. The web server is used to push the Portal authentication page to the user.

Answer(s): A,C



Regarding the basic principles of user access security, it is wrong not to list any description?

  1. When a terminal device accesses the network, it first authenticates the user's identity through the access device, and the access device cooperates with the authentication server to complete the user Authentication.
  2. The terminal device directly interacts with the security policy server, and the terminal reports its own status information, including virus database version, operating system version, and terminal Information such as the patch version installed on the device.
  3. The security policy server checks the status information of the terminal, and for terminal devices that do not meet the corporate security standards, the security policy server reissues. The authorization information is given to the access device.
  4. The terminal device selects the answer to the resource to be accessed according to the result of the status check.

Answer(s): D



Which of the following law items is the most blessed for safety? This should be true?

  1. Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00
  2. Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.
  3. The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.
  4. Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.

Answer(s): D



Viewing page 3 of 42
Viewing questions 11 - 15 out of 201 questions



Post your Comments and Discuss Huawei H12-723 exam prep with other Community members:

Join the H12-723 Discussion