What is the correct description of load balancing between dual frequencies?
What user identity authentication modes does the Agile Controller support? (Multiple Choice)
Which of the following statements about power adjustment is FALSE?
The online process of an AP includes the following phases. What is the correct sequence of these phases?
1. Decide whether to upgrade the AP.
2. The AP and AC establish a CAPWAP tunnel.
3. The AP goes online, and the AC delivers services to the AP.
4. The AP obtains an IP address,
Which of the following statements about N+1 backup is TRUE?
On the N+1 backup network, a total of 300 APs from AP1 to AP300 are deployed on AC1, and 400 APs from AP301 to AP700 are deployed on AC2. The AC can be configured as a standby AP. When the AP goes online, without changing the configuration, the following statement is wrong?
Which statement about Mesh roles is TRUE?
Which statement about the MAP on a Mesh network is FALSE?
In long-distance point-to-point communication over WLAN, if a stable communication link is to be maintained, what percentage of the first Fresnel area can't be blocked?
As shown in the figure, a point-to-point link with a length of 3km, an office building with a height of 9.1m from the ground at the midpoint of the link. If the signal transmission frequency is 5.8GHz, please refer to the following formula according to the actual situation. What is the minimum installation height on the ground?
Which of the following commands is used to check whether automatic channel selection and automatic transmit power selection are enabled for APs?
In which authentication mode can user information synchronized by the Agile Controller be used? (Multiple Choice)
The zone surrounding the line of sight (LOS) is called the Fresnel zone, which is also called the RF LOS.
On a WLAN with flooding attack detection enabled, based on which of the following items does an AP detect flooding attacks?
Regarding the NAC statement, what is wrong with the following description?
A company has deployed a WLAN, and all APs are transmitting WLAN services. The company needs to upgrade AP versions. Which of the following upgrade methods is recommended to minimize the impact on user services?
When the WLAN supports inter-AC roaming, multiple ACs are fully meshed through tunnels. To ensure that STAs roamed to another AC at Layer 3 can still receive broadcast packets from the original subnet, the AC on the subnet broadcasts the packets to all the other ACs through tunnels. In this case, broadcast loops will occur.
When the VRRP hot backup is configured, the active and standby ACs can be hot standby through Layer 3 interworking on two different Layer 2 networks.
Regarding the role of each role in the Portal authentication architecture, is the following description correct?
In the WLAN network, which of the following will trigger an alarm?
In the figure, the main lobe width of the directional antenna is 31°. Which are the angles allowed between two MPs? (Multiple Choice)
The device receives an exception notification when the primary and backup service packets sent by the peer are not received within the time interval between the primary and secondary service packets and the number of retransmissions. Prepare to rebuild the primary and backup backup channels.
Which of the following commands is used to create a static load balancing group?
What is wrong about the description of the first Fresnel zone below?
The channel switching service is not interrupted. When the AP switches channels, the terminal is notified to the terminal in advance, and the time for switching the channel is agreed. When the AP and the terminal switch channels, the service is not interrupted.
The AP detects whether the number of key negotiation failures of the key negotiation packets in the WPA/WPA2 PSK, WAPI-PSK, and WEP-Share-Key authentication exceeds the configured threshold to detect whether it is brute-forced.
Taking 5GHz as an example, if the transmitting and receiving antennas are separated by 5km, the radius of the Fresnel zone is roughly?
When the STA uses the WPA2-802.1x security policy and supports fast roaming, the STA only needs to perform key negotiation, but does not need to pass 802.lx authentication again during roaming.
The Agile Controller synchronization method has manual synchronization and automatic synchronization. Which of the following is true about the synchronization method?
CAC is implemented in three modes. Which of the following statements about CAC implementation based on channel usage is FALSE?
Which of the following four scenarios does not belong to the mesh network?
Devices must be added to different groups on the Agile Controller to facilitate rule delivery.
In a data frame, which values of the To DS and From DS fields identify the device type as AP?
In the figure, transparent transmission of STP packets may cause mutual impact between bops. To prevent the impact, which statement about STP is TRUE?
What is the correct statement about reliability metrics below?
Both the N+1 backup and the dual-link cold backup support the link switchback function. To avoid frequent network switchovers, N+1 backup and dual-link cold backup are waiting for 20 heartbeat cycles by default. Switch back operation.
According to the network, data traffic is transmitted in the STA-HAP-HAC-upper-layer network flow through tunnel forwarding before roaming. What is the flow direction of data traffic after Layer 3 roaming?
Which of the following commands can be used to create an air interface scan template?
On a WLAN network, the AC6005 functions as a RADIUS client device. Is the following statement about the authentication-free template correct?
Which access authentication methods are supported by the Agile Controller?
What are the ways to synchronize data in the WLAN hot backup mechanism?
In intelligent roaming, for a terminal that does not support 802.11v or a fake 802.11v terminal, the AC notifies the current AP that the sticky user is offline and sends a blacklist to the currently associated AP.
As shown in the figure, for the part of the RF tuning process, the following steps are correct for the RF tuning operation steps?
Which figure shows the load balancing mode provided by the HSB solution?
After setting up tunnels with the active and standby ACs, the AP sends Echo messages to monitor tunnel status. The Echo messages contain the active/standby status of the tunnels. When the AP detects that the primary tunnel fails, it sends an Echo Request message with the active flag to the standby AC. After receiving the Echo Request message, the standby AC becomes the active AC, and the AP sends STA data to this AC.
What of the following items are Agile Controller authorization elements? (Multiple Choice)
Which of the following statements about rogue device identification on a WLAN with the WIDS function enabled are TRUE? (Multiple Choice)
In the WLAN network using the Agile Controller as the admission controller, the following statement about the pre-authentication domain is correct.
In the WLAN network with WIDS enabled, what is the correct statement about illegal devices?
What does the OU in the directory server stand for?
What are the benefits of intelligent roaming?
Which statements about Layer 2 and Layer 3 roaming are TRUE? (Multiple Choice)
On a WLAN, which of the following attack detection functions require support of the dynamic blacklist function? (Multiple Choice)
When installing a long-distance point-to-point RF communication link, if the distance between the transmitting and receiving antennas exceeds several kilometers, consider the influence of the curvature of the Earth?
In a WLAN network environment, after a Spoof spoofing attack, the attacking terminal cannot be determined by the MAC address.
An engineer cannot establish a connection with the AD server during the configuration of the Agile Controller. The engineer checks the IP address of the AD directory server and the synchronization account and password are correct. The configuration of the AD directory server is not configured. The detailed configuration is shown in the following figure. What is the cause of this problem?
What is wrong about the return type VAP description below?
Regarding the 802.1X authentication method, is the following description correct?
Which are the methods to prevent loops on a Mesh network? (Multiple Choice)
Which of the following statements is TRUE about the DN parameter in the directory server?
Which of the following statements about bad balancing are TRUE? (Multiple Choice)
On a WLAN network, the following two types of packets are included in the Spoof spoofing attack packet?
An engineer enables dual-link backup but does not change the CAPWAP heartbeat detection interval and the number of heartbeat packet transmissions. In default situation, what is the heartbeat packet transmission timeout interval of the active link before an active/standby switchover occurs?
Which statements about roaming are TRUE? (Multiple Choice)
Which statement about STP on a Mesh network is FALSE?
Which of the following statements about the three backup modes are TRUE? (Multiple Choice)
As shown in the figure, in the dual-link load balancing hot standby network, AP1 is a new online AP, and both ACs have access configuration. Which AC does AP1 choose to access?
What is the protection time for blind handover in smart roaming?
In the hot standby, the following statement about the HSB backup channel is wrong?
As shown in the figure, the WIDS attack detection process, after completing the dynamic blacklist, how does the AP handle different data traffic when it is in the blacklist penalty period?
When a neighbor passively detects, what information does the legal AP need to collect and report to the AC?
Regarding the load sharing method of the dual-system hot backup solution, is the following statement correct?
Which statement about smart roaming is FALSE?
In intelligent roaming, when the current associated AP detects that it is a sticky terminal, the terminal that actively supports the 802.11k will actively trigger the terminal to perform neighbor measurement based on the 802.11k mechanism. Regarding this measurement, what information does the terminal mainly collect?
Which of the following statement is TRUE about AC functions in the implementation of radio calibration?
Which of the followings are implementation modes of CAC? (Multiple Choice)
The Agile Controller can synchronize user information with the AD or LDAP directory server. Therefore, the Agile Controller can synchronize user information with any directory server that supports the LDAP directory service protocol.
What is the sequence of VLAN VLAN allocation for a terminal? 1. The terminal accesses from the divided VLANs. 2. Determines the VLAN Pool and VLAN algorithm bound to the VAP. 3. The terminal accesses the VAP 4. Assigns a VLAN to the terminal according to the VLAN algorithm.
As shown in the figure, in a large enterprise WLAN network, the network administrator of the company recently discovered that the WLAN network traffic is abnormal, and the ping gateway has a delay or a large amount of packet loss. After excluding other possibilities, it is suspected that an illegal network attack has occurred. Which kind of illegal attack is the most likely?