Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Huawei H12-321 Huawei Certified Network Professional - Wireless Local Area Network- Constructing Enterprise WLAN Architecture Exam Practice Test

Demo: 79 questions
Total 536 questions

Huawei Certified Network Professional - Wireless Local Area Network- Constructing Enterprise WLAN Architecture Questions and Answers

Question 1

What is the correct description of load balancing between dual frequencies?

Options:

A.

When the load difference between the 5G and 2.4G radios is within the equalization threshold, the AP will direct the terminal to associate with the 5G.

B.

When the load on the 5G radio exceeds 2.4G at the equalization threshold, the AP will direct the terminal to associate with 2.4G.

C.

When the load on the 5G radio exceeds 2.4G in the equalization threshold, if the terminal is associated with 5G, the AP will always reject the terminal association until the terminal associates 2.4G.

D.

If the load balancing difference threshold is set to 10, it means that if the number of terminals on the 5G radio exceeds more than 10 of the 2.4G radio, the load between the two frequencies is considered to be unbalanced.

Question 2

What user identity authentication modes does the Agile Controller support? (Multiple Choice)

Options:

A.

Authentication using a common account

B.

Third-party authentication

C.

Authentication using a digital certificate

D.

MAC address bypass authentication

Question 3

Which of the following statements about power adjustment is FALSE?

Options:

A.

An AP's transmit power determines its radio coverage area. APs with higher power have larger coverage areas.

B.

The global radio calibration algorithm includes the Dynamic Channel Allocation (DCA) algorithm and Transmit Power Control (IPC) algorithm.

C.

A traditional method to control the radio power is to set the transmit power to the maximum value to maximize the radio coverage area. However, a high transmit power may cause interference to other wireless devices.

D.

During dynamic power adjustment, it is necessary to select an optimal power to balance the signal coverage with system capacity.

Question 4

The online process of an AP includes the following phases. What is the correct sequence of these phases?

1. Decide whether to upgrade the AP.

2. The AP and AC establish a CAPWAP tunnel.

3. The AP goes online, and the AC delivers services to the AP.

4. The AP obtains an IP address,

Options:

A.

2->4->l->3

B.

4->l->2->3

C.

4->2->l->3

D.

2->l->4->3

Question 5

Which of the following statements about N+1 backup is TRUE?

Options:

A.

The models and software versions of the active and standby ACs must be the same.

B.

The active and standby ACs can be of different models but must use the same software version.

C.

A standby AC can provide backup services for multiple active ACs. This mode reduces device purchase costs and has higher reliability than VRRP HSB.

D.

N+1 backup is a cold backup mode, which backs up AP and STA information.

Question 6

On the N+1 backup network, a total of 300 APs from AP1 to AP300 are deployed on AC1, and 400 APs from AP301 to AP700 are deployed on AC2. The AC can be configured as a standby AP. When the AP goes online, without changing the configuration, the following statement is wrong?

Options:

A.

If the AC1 is faulty, the APs in the AP1 to AP300 will perform the active/standby switchover in the AC3.

B.

If the AC2 is faulty, the APs of the AP301 to the AP700 will perform the active/standby switchover in the AC3.

C.

If AC1 and AC2 are faulty at the same time, only the 500 APs from AP1 to AP500 can perform active/standby switchover in AC3, and the remaining 200 APs cannot go online in AC3. The services of these APs will be interrupted.

D.

After the AC1 or AC2 fails to recover, the APs that go online in AC1 and AC2 are undefined.

Question 7

Which statement about Mesh roles is TRUE?

Options:

A.

Mesh roles are configured based on radio.

B.

Mesh roles are configured based on AP.

C.

Mesh roles are configured based on VAP.

D.

Mesh roles are configured based on any conditions.

Question 8

Which statement about the MAP on a Mesh network is FALSE?

Options:

A.

MAP is a special form of MP.

B.

MAP is a special form of MPP.

C.

An MAP is usually connected to STAs.

D.

Any MP supporting the AP function can provide access to STAs.

Question 9

In long-distance point-to-point communication over WLAN, if a stable communication link is to be maintained, what percentage of the first Fresnel area can't be blocked?

Options:

A.

0.2

B.

0.4

C.

0.5

D.

0.6

Question 10

As shown in the figure, a point-to-point link with a length of 3km, an office building with a height of 9.1m from the ground at the midpoint of the link. If the signal transmission frequency is 5.8GHz, please refer to the following formula according to the actual situation. What is the minimum installation height on the ground?

Options:

A.

9.1m

B.

10m

C.

13m

D.

18m

Question 11

Which of the following commands is used to check whether automatic channel selection and automatic transmit power selection are enabled for APs?

Options:

A.

[AC-wlan-view] display station ssid wlan-ne

B.

[AC-wlan-view] display rrm-profile name

C.

profile-name r [AC-wlan-view] display radio all

D.

[AC-wlan-view] display vap-profile name profile-name

Question 12

In which authentication mode can user information synchronized by the Agile Controller be used? (Multiple Choice)

Options:

A.

Portal authentication

B.

802.lx authentication

C.

Agile Controller login authentication

D.

MAC address bypass authentication

Question 13

The zone surrounding the line of sight (LOS) is called the Fresnel zone, which is also called the RF LOS.

Options:

A.

TRUE

B.

FALSE

Question 14

On a WLAN with flooding attack detection enabled, based on which of the following items does an AP detect flooding attacks?

Options:

A.

Number of associated STAs

B.

STA association and disassociation frequencies

C.

Number of association attempts by STAs

D.

Traffic volume from STAs

Question 15

Regarding the NAC statement, what is wrong with the following description?

Options:

A.

NAC (Network Admission Control) is called network admission control.

B.

NAC is an end-to-end security architecture that includes 802.1x, MAC and Portal authentication.

C.

NAC access terminal equipment, if you need Portal authentication, you need to install client software.

D.

NAC access terminals use 802.1x authentication, you need to install client software.

Question 16

A company has deployed a WLAN, and all APs are transmitting WLAN services. The company needs to upgrade AP versions. Which of the following upgrade methods is recommended to minimize the impact on user services?

Options:

A.

Automatic AP upgrade

B.

In-service AP upgrade

C.

AP upgrade through the web system

D.

AP upgrade in Boot mode

Question 17

When the WLAN supports inter-AC roaming, multiple ACs are fully meshed through tunnels. To ensure that STAs roamed to another AC at Layer 3 can still receive broadcast packets from the original subnet, the AC on the subnet broadcasts the packets to all the other ACs through tunnels. In this case, broadcast loops will occur.

Options:

A.

TRUE

B.

FALSE

Question 18

When the VRRP hot backup is configured, the active and standby ACs can be hot standby through Layer 3 interworking on two different Layer 2 networks.

Options:

A.

Correct

B.

False

Question 19

Regarding the role of each role in the Portal authentication architecture, is the following description correct?

Options:

A.

The RADIUS server stores information such as the username and password for authentication of the access user.

B.

The portal server stores information such as the username and password for authentication of the access user.

C.

The RADIUS server is used to push the Portal authentication page to the user.

D.

Portal server is used to push the Portal authentication page to the user.

Question 20

In the WLAN network, which of the following will trigger an alarm?

Options:

A.

Flood attack

B.

Spoof attack

C.

Weak IV attack

D.

Violent cracking

Question 21

In the figure, the main lobe width of the directional antenna is 31°. Which are the angles allowed between two MPs? (Multiple Choice)

Options:

A.

20°

B.

30°

C.

40°

D.

60°

Question 22

The device receives an exception notification when the primary and backup service packets sent by the peer are not received within the time interval between the primary and secondary service packets and the number of retransmissions. Prepare to rebuild the primary and backup backup channels.

Options:

A.

Correct

B.

False

Question 23

Which of the following commands is used to create a static load balancing group?

Options:

A.

[AC-wlan-view] regulatory-domain-profile name domain1

B.

[AC-w Ian-view] air-scan-profile name wlan-airscan

C.

[AC-wlan-view] rrm-profile name profile-name

D.

[AC-wlan-view] sta-load-balance static-group name static-1

Question 24

What is wrong about the description of the first Fresnel zone below?

Options:

A.

The first Fresnel zone will affect the integrity of RF communications even if it is partially blocked.

B.

The Fresnel zone is blocked and the RF signal is diffracted or bent.

C.

Signal diffraction will cause the RF energy received by the antenna to decrease, and even lead to communication link interruption.

D.

In any case, the proportion of the first Fresnel zone blocked by obstacles should not exceed 60%.

Question 25

The channel switching service is not interrupted. When the AP switches channels, the terminal is notified to the terminal in advance, and the time for switching the channel is agreed. When the AP and the terminal switch channels, the service is not interrupted.

Options:

A.

Correct

B.

False

Question 26

The AP detects whether the number of key negotiation failures of the key negotiation packets in the WPA/WPA2 PSK, WAPI-PSK, and WEP-Share-Key authentication exceeds the configured threshold to detect whether it is brute-forced.

Options:

A.

Correct

B.

False

Question 27

Taking 5GHz as an example, if the transmitting and receiving antennas are separated by 5km, the radius of the Fresnel zone is roughly?

Options:

A.

3.6m

B.

5.6m

C.

8m

D.

9.7m

Question 28

When the STA uses the WPA2-802.1x security policy and supports fast roaming, the STA only needs to perform key negotiation, but does not need to pass 802.lx authentication again during roaming.

Options:

A.

TRUE

B.

FALSE

Question 29

The Agile Controller synchronization method has manual synchronization and automatic synchronization. Which of the following is true about the synchronization method?

Options:

A.

The Agile Controller can only use one synchronization mode to avoid mutual interference.

B.

The first synchronization of the Agile Controller must be synchronized manually, after which the automatic synchronization can be used.

C.

The synchronization time point of the automatic synchronization of the Agile Controller can be modified.

D.

Agile Controller manual synchronization can only be used three times a day to prevent artificially increasing network load.

Question 30

CAC is implemented in three modes. Which of the following statements about CAC implementation based on channel usage is FALSE?

Options:

A.

When receiving a new access request, an AP calculates the current channel usage and checks whether the channel usage reaches the threshold. If not, the AP allows the user to go online.

B.

If the channel usage reaches the threshold after a new user goes online, an AP will reject access requests of new users, send alarms, but cannot hide its SSID.

C.

When a roaming user attempts to access an AP, the AP checks whether the channel usage reaches the CAC roaming threshold. If so, the AP will reject the access request of the roaming user and send alarms.

D.

An AP periodically detects the channel usage of a radio. Once the channel usage falls below the threshold, the AP sends a clear alarm, allowing new users to go online.

Question 31

Which of the following four scenarios does not belong to the mesh network?

Options:

A.

(a)

B.

(b)

C.

(c)

D.

(d)

Question 32

Devices must be added to different groups on the Agile Controller to facilitate rule delivery.

Options:

A.

TRUE

B.

FALSE

Question 33

In a data frame, which values of the To DS and From DS fields identify the device type as AP?

Options:

A.

0, 0

B.

0,1

C.

1,0

D.

1, 1

Question 34

In the figure, transparent transmission of STP packets may cause mutual impact between bops. To prevent the impact, which statement about STP is TRUE?

Options:

A.

STP needs to be enabled on only MPP's wired interfaces.

B.

STP needs to be enabled on only MP3's wired interfaces.

C.

STP needs to be enabled on the wired interfaces of both MPP and MP3.

D.

STP needs to be enabled on MP1 and MP2.

Question 35

What is the correct statement about reliability metrics below?

Options:

A.

Generally, we use the two technical indicators of mean time between failure MTBF and mean time to repair MTTR to evaluate system reliability.

B.

MTBF is the average time it takes for a system to go from failure to recovery, usually in hours. The more MTBF, the higher the reliability

C.

MTTR is the average time required for a system to recover from a failure to recovery.

D.

MTTR is calculated as: MTTR = fault detection time + hardware replacement time + system initialization time + link recovery time + route coverage time + forwarding recovery time. The smaller the MTTR value, the higher the reliability.

Question 36

Both the N+1 backup and the dual-link cold backup support the link switchback function. To avoid frequent network switchovers, N+1 backup and dual-link cold backup are waiting for 20 heartbeat cycles by default. Switch back operation.

Options:

A.

Correct

B.

False

Question 37

According to the network, data traffic is transmitted in the STA-HAP-HAC-upper-layer network flow through tunnel forwarding before roaming. What is the flow direction of data traffic after Layer 3 roaming?

Options:

A.

STA-FAP-FAC-HAC-upper-layer network

B.

STA-FAP-FAC-HAC-HAP-HAC-upper-byer network

C.

STA-FAP-FAC-upper-layer network

D.

STA-FAP-FAC-HAC-FAC-upper-layer network

Question 38

Which of the following commands can be used to create an air interface scan template?

Options:

A.

[AC-wlan-view] rrm-profile name wlan-net

B.

[AC-wlan-view] air-scan-profile name wlan-airscan

C.

[AC-wlan-view] vap-profile name wlan-vap

D.

[AC-wlan-view] ssid-profile name wlan-ssid

Question 39

On a WLAN network, the AC6005 functions as a RADIUS client device. Is the following statement about the authentication-free template correct?

Options:

A.

The authentication-free template is used to direct the IP address of the antivirus device such as the virus gateway and firewall.

B.

The authentication-free template is used to release DNS, DHCP, and the IP address of the authentication server.

C.

Authentication-free templates can call advanced ACLs

D.

The authentication-free template can only use the ACL call to release the specified IP address.

Question 40

Which access authentication methods are supported by the Agile Controller?

Options:

A.

802.1x certification

B.

Portal authentication

C.

MAC certification

D.

RADIUS

Question 41

What are the ways to synchronize data in the WLAN hot backup mechanism?

Options:

A.

Batch backup

B.

Real-time backup

C.

Timed backup

D.

Incremental backup

Question 42

In intelligent roaming, for a terminal that does not support 802.11v or a fake 802.11v terminal, the AC notifies the current AP that the sticky user is offline and sends a blacklist to the currently associated AP.

Options:

A.

Correct

B.

False

Question 43

As shown in the figure, for the part of the RF tuning process, the following steps are correct for the RF tuning operation steps?

Options:

A.

d, a, b, c

B.

a, b, d, c

C.

a, d, b, c

D.

a, b, c, d

Question 44

Which figure shows the load balancing mode provided by the HSB solution?

Options:

A.

(a)

B.

(b)

C.

(C)

D.

(d)

Question 45

After setting up tunnels with the active and standby ACs, the AP sends Echo messages to monitor tunnel status. The Echo messages contain the active/standby status of the tunnels. When the AP detects that the primary tunnel fails, it sends an Echo Request message with the active flag to the standby AC. After receiving the Echo Request message, the standby AC becomes the active AC, and the AP sends STA data to this AC.

Options:

A.

TRUE

B.

FALSE

Question 46

What of the following items are Agile Controller authorization elements? (Multiple Choice)

Options:

A.

ssid

B.

Time

C.

Device name

D.

IP address

Question 47

Which of the following statements about rogue device identification on a WLAN with the WIDS function enabled are TRUE? (Multiple Choice)

Options:

A.

All ad-hoc deices are identified as rogue devices.

B.

APs not managed by the local AC are identified as rogue APs.

C.

STAs that do not go online through the local AC are identified as rogue STAs.

D.

If a STA does not go online through the local AC, the AC checks whether the STA is associated with an authorized AP.

Question 48

In the WLAN network using the Agile Controller as the admission controller, the following statement about the pre-authentication domain is correct.

Options:

A.

The pre-authentication domain is configured in the same way as the post-authentication domain.

B.

If an ACL is used to match the pre-authentication domain, a user ACL is required.

C.

There are two configuration methods for the pre-authentication domain, one is to call the ACL, and the other is to directly add the exemption rule.

D.

The address that needs to be released before the authentication domain is generally an antivirus gateway, firewall, and mail server.

Question 49

In the WLAN network with WIDS enabled, what is the correct statement about illegal devices?

Options:

A.

So the Ad-hoc device will be directly determined to be an illegal device.

B.

The AC is not connected to the AP as a rogue AP.

C.

The local AC access STA is not an illegal STA.

D.

It is not the AC accessing the STA. It is also necessary to check whether the access AP is legal.

Question 50

What does the OU in the directory server stand for?

Options:

A.

User

B.

User group

C.

Organizational unit

D.

Domain

Question 51

What are the benefits of intelligent roaming?

Options:

A.

Improve the terminal's own business experience and overall performance of the wireless channel

B.

Improve wireless channel performance

C.

Load balancing

D.

Spectrum navigation

Question 52

Which statements about Layer 2 and Layer 3 roaming are TRUE? (Multiple Choice)

Options:

A.

After Layer 3 roaming is performed, the VLAN IDs in the service set of APs are changed.

B.

If the VLAN IDs before and after roaming are the same, the STA roams at Layer 2.

C.

Layer 2 roaming indicates that STAs roam within the same subnet.

D.

Layer 3 roaming indicates that STAs roam between different subnets.

Question 53

On a WLAN, which of the following attack detection functions require support of the dynamic blacklist function? (Multiple Choice)

Options:

A.

Flooding attack detection

B.

Spoofing attack detection

C.

Weak IV attack detection

D.

Brute force attack detection

Question 54

When installing a long-distance point-to-point RF communication link, if the distance between the transmitting and receiving antennas exceeds several kilometers, consider the influence of the curvature of the Earth?

Options:

A.

3.3km

B.

5.3km

C.

7.3km

D.

11.3km

Question 55

In a WLAN network environment, after a Spoof spoofing attack, the attacking terminal cannot be determined by the MAC address.

Options:

A.

Correct

B.

False

Question 56

An engineer cannot establish a connection with the AD server during the configuration of the Agile Controller. The engineer checks the IP address of the AD directory server and the synchronization account and password are correct. The configuration of the AD directory server is not configured. The detailed configuration is shown in the following figure. What is the cause of this problem?

Options:

A.

Synchronization type error

B.

The authentication source name is incorrect.

C.

Port error

D.

Base DN error E. SSL is not enabled

Question 57

What is wrong about the return type VAP description below?

Options:

A.

Complete MP neighbor discovery

B.

Complete the MESH connection establishment and data return function

C.

Establish routing topology between nodes by forwarding route management packets on the backhaul link

D.

Multiple RF backhaul VAPs can be created for each RF

Question 58

Regarding the 802.1X authentication method, is the following description correct?

Options:

A.

802.1X authentication mode is divided into EAP termination and EAP transparent transmission.

B.

EAP transparent authentication requires the NAS device to identify and resolve key information in the EAP and map it to the RADIUS packet to complete the entire authentication.

C.

EAP termination authentication does not require the NAS to resolve EAP packets. Instead, the EAP is encapsulated in RADIUS packets, so that authentication packets traverse the encapsulated network and reach the authentication server.

D.

EAP transparent authentication is also called EAP relay authentication.

Question 59

Which are the methods to prevent loops on a Mesh network? (Multiple Choice)

Options:

A.

STP

B.

TTL

C.

Repeated frame sequence number check

D.

MSTP

Question 60

Which of the following statements is TRUE about the DN parameter in the directory server?

Options:

A.

Each directory server has the DN parameter.

B.

Only the LDAP server has the DN parameter.

C.

The DN parameter needs to be manually configured by the directory server administrator.

D.

Only the AD server has the DN parameter.

Question 61

Which of the following statements about bad balancing are TRUE? (Multiple Choice)

Options:

A.

An AP radio can join only one load balancing group.

B.

If dual-band APs are used, traffic is load balanced among APs working on the same frequency band.

C.

A dual-band AP can join two load balancing groups.

D.

Each load balancing group supports a maximum of 32 members.

Question 62

On a WLAN network, the following two types of packets are included in the Spoof spoofing attack packet?

Options:

A.

Broadcast type de-correlation frame Disassociation

B.

Broadcast-type deauthentication frame Deauthentication

C.

Unicast type de-correlation frame Disassociation

D.

Unicast type of deauthentication frame Deauthentication

Question 63

An engineer enables dual-link backup but does not change the CAPWAP heartbeat detection interval and the number of heartbeat packet transmissions. In default situation, what is the heartbeat packet transmission timeout interval of the active link before an active/standby switchover occurs?

Options:

A.

25 seconds

B.

50 seconds

C.

75 seconds

D.

150 seconds

Question 64

Which statements about roaming are TRUE? (Multiple Choice)

Options:

A.

STA roaming indicates the process in which STAs switch from one AP to another.

B.

In both Layer 2 and Layer 3 roaming, STAs' IP addresses remain unchanged.

C.

The APs used to implement WLAN roaming must be of the same model.

D.

When an AC receives an association/re-association request, it determines that the STA roams if an entry about the STA already exists.

Question 65

Which statement about STP on a Mesh network is FALSE?

Options:

A.

An AC can issue STP configurations to APs only when wired interfaces of APs are not bound to an Eth-Trunk.

B.

Mesh links only transparently transmit STP packets.

C.

An STP-enabled AP does not forward STP packets to the wireless side. STP takes effect only on the AP's wired side.

D.

STP can prevent loops for multiple rings on a Mesh network.

Question 66

Which of the following statements about the three backup modes are TRUE? (Multiple Choice)

Options:

A.

Dual-link HSB: backs up AP, STA, and CAPWAP link information.

B.

VRRP HSB: backs up AP, STA, and CAPWAP link information.

C.

No matter in hot standby or cold standby mode, a standby AC can provide backup services for only one active AC.

D.

Dual-link backup is a cold backup mode, which does not back up STA information. An AP sets up a link with both the active and standby ACs. During an active/standby switchover or a revertive switchover, STAs need to go online again and services are temporarily interrupted.

Question 67

As shown in the figure, in the dual-link load balancing hot standby network, AP1 is a new online AP, and both ACs have access configuration. Which AC does AP1 choose to access?

Options:

A.

AC1

B.

AC2

C.

Random access

D.

Will not access

Question 68

What is the protection time for blind handover in smart roaming?

Options:

A.

20 minutes

B.

30 minutes

C.

60 minutes

D.

15 minutes

Question 69

In the hot standby, the following statement about the HSB backup channel is wrong?

Options:

A.

The HSB backup channel between the primary and backup ACs is recommended to be connected separately to ensure high reliability.

B.

The HSB backup combination backup service is independent of each other, and the HSB backup group can work normally without binding.

C.

In the VRRP hot standby, the active/standby status of the HSB backup channel changes with the active/standby status of the VRRP.

D.

Under dual-link hot backup, the HSB channel has no active/standby status, only the data backup channel.

Question 70

As shown in the figure, the WIDS attack detection process, after completing the dynamic blacklist, how does the AP handle different data traffic when it is in the blacklist penalty period?

Options:

A.

Forward normal data traffic and discard attack traffic

B.

Discard normal data traffic and report attack traffic

C.

Forward normal data traffic and report attack traffic

D.

Drop normal data traffic and discard attack traffic

Question 71

When a neighbor passively detects, what information does the legal AP need to collect and report to the AC?

Options:

A.

Interference between APs

B.

Interference from illegal APs

C.

Interference from non-Wi-Fi devices

D.

Infrared interference

Question 72

Regarding the load sharing method of the dual-system hot backup solution, is the following statement correct?

Options:

A.

VRRP hot backup mode can be applied to load sharing mode.

B.

The selection of active and standby devices for dual-system hot backup is consistent with the selection of dual-link active and standby devices.

C.

The HSB active/standby service backs up related information on the primary device to the backup device.

D.

Dual-link backup can be applied to load sharing mode

Question 73

Which statement about smart roaming is FALSE?

Options:

A.

Smart roaming directs sticky STAs to APs with better signals, preventing STAs from sticking to the original AP.

B.

Smart roaming directs STAs to APs with better signals in a timely manner.

C.

Smart roaming can be implemented only when it is supported by STAs.

D.

Smart roaming enables the active probe function, so that APs can quickly collect neighbor information. Once a neighboring AP meets the condition, active roaming is triggered.

Question 74

In intelligent roaming, when the current associated AP detects that it is a sticky terminal, the terminal that actively supports the 802.11k will actively trigger the terminal to perform neighbor measurement based on the 802.11k mechanism. Regarding this measurement, what information does the terminal mainly collect?

Options:

A.

AP's BSSID

B.

Signal strength

C.

Model of the AP

D.

The channel where the AP is located

Question 75

Which of the following statement is TRUE about AC functions in the implementation of radio calibration?

Options:

A.

The AC maintains AP neighbor topology information according to the radio environment information sent by APs.

B.

The AC runs the radio calibration algorithm to coordinate and allocate channels and transmit power of APs.

C.

The channel adjustment and power adjustment algorithms in radio calibration are coupled with each other, and the AC needs to consider their influence to each other.

D.

The AC sends alarms, such as the AP offline alarms to the network management system.

Question 76

Which of the followings are implementation modes of CAC? (Multiple Choice)

Options:

A.

Based on channel usage

B.

Based on the number of users

C.

Based on the terminal SNR

D.

Based on the number of APs

Question 77

The Agile Controller can synchronize user information with the AD or LDAP directory server. Therefore, the Agile Controller can synchronize user information with any directory server that supports the LDAP directory service protocol.

Options:

A.

TRUE

B.

FALSE

Question 78

What is the sequence of VLAN VLAN allocation for a terminal? 1. The terminal accesses from the divided VLANs. 2. Determines the VLAN Pool and VLAN algorithm bound to the VAP. 3. The terminal accesses the VAP 4. Assigns a VLAN to the terminal according to the VLAN algorithm.

Options:

A.

3->2->4->1

B.

4->2->3->1

C.

4->3->2->1

D.

3->4->2->1

Question 79

As shown in the figure, in a large enterprise WLAN network, the network administrator of the company recently discovered that the WLAN network traffic is abnormal, and the ping gateway has a delay or a large amount of packet loss. After excluding other possibilities, it is suspected that an illegal network attack has occurred. Which kind of illegal attack is the most likely?

Options:

A.

Flood attack

B.

Spoof attack

C.

Weak IV attack

D.

Violent cracking

Demo: 79 questions
Total 536 questions