HCIP-Security-CTSS V3.0 Mock Exam
HCIP-Security-CTSS V3.0 Mock Exam
HCIP-Security-CTSS V3.0 Mock Exam
0 mock exam
1.(Multi-choice) If port 80 is occupied, what failures will happen to the business manager.
2.(Multi-choice) eSight provides IPSec VPN service discovering, which of following methods of
A.Preshared Key
B.Digital signature
C.Digital Envelope
D.Certificate
3.(Single-choice) When the Agile Controller-Campus functions as the RADIUS server to provide
authentication functions, which port needs to be configured as the authentication port on the
A.1812
B.1813
C.8443
D.8080
4.(Ture or False) In MAC address authentication, if a terminal does not respond to the 802.1X
authentication request from the access control device, the access control device automatically
obtains the MAC address of the terminal and sends it to the RADIUS server as the credential for
verification.
5.(Single-choice) Which statement about the ACL used in association between the SACG device
C.As the SACG device receives rules from the TSM system through ACLs numbered 3099 to
3999, users must ensure that these ACLs are not referenced by other functions before
D.The SACG device can associate with the TSM system even if ACLs numbered 3099 to 3999 are
A.AD account
C.Anonymous account
D.Guest account
7.(Single-choice) When the security policy is synchronized with eSight, what is the maximum
A.10
B.30
C.50
D.100
8.(Single-choice) Netconf is one kind of network configuration and management protocol based
on_____?
A.XML
B.HTML
C.JAVA
D.Python
9.(Ture or False) The free mobility function provides a special access control mode and grants
specified rights to users based on the access location, access time, access mode, and terminal
第 2 页, 共 5 页
HCIP-Security-CTSS V3.0 mock exam
type. Users enjoy the same rights and network experience as long as the access conditions
remain unchanged.
10. (Multi-choice) Which statements about the integrated and distributed deployment scenarios
A.If most users are concentrated in an area and only a few users are located in branch offices,
B.If most users are concentrated in an area and only a few users are located in branch offices,
C.If users are distributed in different areas, the distributed deployment mode is recommended.
D.If users are distributed in different areas, the integrated deployment mode is recommended.
11.(Single-choice) When dealing with the terminal security system failure, the administrator
D.According to the error code to find the cause and solve the problem.
12. (Multi-choice) Assume that Portal authentication is correctly configured on the Agile
follows:
A.After the configuration is complete, the switch automatically permits data flows to access the
B.After the configuration is complete, users can directly access network resources before
passing authentication.
C.After the configuration is complete, the administrator needs to manually permit access to the
第 3 页, 共 5 页
HCIP-Security-CTSS V3.0 mock exam
D.Terminals can access the host with the IP address 10.1.31.78 only after passing authentication.
13.(Multi-choice) Which statements about MAC address authentication and MAC address
A.MAC address authentication controls a user's network access rights based on the user's
interface and MAC address. The user does not need to install any client software.
B.In MAC address bypass authentication, the system performs 802.1X authentication on the
access terminal first. If the terminal does not respond to 802.1X authentication, MAC address
C.During the MAC address authentication process, the user needs to enter a user name or
password.
D.In the MAC address bypass authentication process, the terminal MAC address is not used as
14.(Ture or False) A BSSID is the MAC address of an AP and identifies the BSS managed by the
AP.
15. (Multi-choice) Which actions can be performed on the Agile Controller-Campus after user
authentication succeeds?
A.Providing remote assistance for users accessing the network using AnyOffice
16.(Single-choice) Which device is usually used as the hardware SACG in the Agile Controller-
Campus solution?
A.Router
B.Switch
第 4 页, 共 5 页
HCIP-Security-CTSS V3.0 mock exam
C.Firewall
D.IPS
17.(Ture or False) An account belongs to only one user group. That is, one user belongs to only
one department.
18. (Single-choice) Accounts on the Agile Controller-Campus are classified into two types: local
A.Common account
B.Guest account
C.Anonymous account
19. (Multi-choice) To enhance AP security, an AC can authenticate the APs that attempt to
B.Password authentication
C.Non-authentication
D.SN authentication
Answers: 1.AC 2.AC 3.A 4.F 5.C 6.AB 7.D 8.A 9.T 10.AC 11.B