Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-321 Questions and Answers

Note! Following H12-321 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H12-321_V1.0

H12-321 Questions and Answers

Question # 6

During deployment of a long-distance point-to-point RF communication link, what is the distance between the receive and transmit antennas when impact of the Earth curvature should be considered?

A.

3.3 km

B.

5.3 km

C.

7.3 km

D.

11.3 km

Full Access
Question # 7

On a layer 2 WLAN, in which modes can an AP discover the AC? (Multiple Choice)

A.

Multicast

B.

Unicast

C.

Broadcast

D.

Anycast

Full Access
Question # 8

When a large-scale enterprise deploys a WLAN Layer 3 network, you need to configure the Option 43 field on the Windows 2003 DHCP server to notify the AP of the IP address of the AC. The IP address of the AC is 10.23.100.1. Which of the following is required in the Option 43 field on the DHCP server?

A.

030831302E32332E3130302E31

B.

040831302E32332E3130302E31

C.

030B31302E32332E3130302E31

D.

030B31302E32332E31302E3031

Full Access
Question # 9

The following statement about N+1 backup is correct?

A.

The model and software version of the active and standby ACs must be identical.

B.

The configuration of the active and standby AC products can be different. Only the software version of the AC must be consistent.

C.

A standby AC can provide backup services for multiple primary ACs, reducing the cost of purchasing equipment, and the reliability is higher than VRRP hot backup.

D.

N+1 backup is a cold backup, backing up AP information and STA information.

Full Access
Question # 10

Which statements about roaming are TRUE? (Multiple Choice)

A.

The APs an STA connects to before and after roaming must work in the same channel.

B.

The APs an STA connects to before and after roaming can work in different channels.

C.

During roaming, the STA sends a re-association request containing information about the original AP to the new AP.

D.

During roaming, the STA sends an association request containing information about the original AP to the new AP.

Full Access
Question # 11

As shown in the figure, the following is the load sharing mode of the dual-system hot backup solution?

A.

a

B.

b

C.

c

D.

d

Full Access
Question # 12

In AP-based load balancing, what is the correct description of dynamic load balancing?

A.

Dynamic load balancing solves the problem of limited number of members in static load balancing

B.

The number of dynamic load balancing members is the same as the number of static load balancing members.

C.

Each member of the dynamic load balancing equalization group is automatically configured or can be a different frequency band.

D.

Each member of the dynamic load balancing equalization group can be automatically configured but must be in the same frequency band.

Full Access
Question # 13

In public places where WLAN services are available, such as banks and airports, users can connect to the WLANs after associating with corresponding SSIDs. If a rogue AP is deployed and provides bogus SSIDs the same as or similar to authorized SSIDs, users may connect to the rogue AP, which brings security risks. Which of the following functions can solve this problem?

A.

WIDS rogue device countermeasure

B.

WIDS attack detection + WIDS blacklist

C.

WIDS attack detection + WIDS rogue device countermeasure

D.

Bogus SSID identification rules + WIDS rogue device countermeasure

Full Access
Question # 14

Which are the correct procedures for a Mesh node going online through an AC? (Multiple Choice)

A.

1. An AP connects to an online Mesh neighbor through air interfaces.

2. The AP and neighbor negotiate the key, and then set up a Mesh route.

3. The AP obtains an IP address through DHCP.

4. The AP discovers the AC and goes online.

B.

1. An AP connects to an online Mesh neighbor through air interfaces.

2. The AP and neighbor set up a Mesh route, and then negotiate the key.

3. The AP obtains an IP address through DHCP.

4. The AP discovers the AC and goes online.

C.

1. An AP connects to an online Mesh neighbor through air interfaces.

2. The AP and neighbor negotiate the key.

3. The AP obtains an IP address through DHCP.

4. The AP and neighbor set up a Mesh route.

5. The AP discovers the AC and goes online.

D.

1. Once the AP is powered on, it goes online and obtains configurations from the AC.

2. The AP performs link establishment and key negotiation according to the obtained configurations.

Full Access
Question # 15

After AP online configuration is complete on a Layer 3 WLAN, APs cannot go online. What are the possible causes? (Multiple Choice)

A.

The source interface is not configured.

B.

The network route is unreachable.

C.

The Option 43 field is not configured.

D.

VLAN Pool is not configured.

Full Access
Question # 16

Which statement about the directional antenna is FALSE?

A.

Signals from a directional antenna radiate in a certain angle.

B.

The directional antenna can concentrate energy and transmit signals to a specified direction.

C.

The directional antenna is a good choice when a few linked devices exist or the linked devices are concentrated in a certain angle.

D.

Only the main lobe is useful, and other lobes are not needed.

Full Access
Question # 17

For small businesses, we generally recommend which feature of WIDS/WIPS is enabled to secure WLAN networks?

A.

Illegal device detection

B.

Illegal equipment counter

C.

WIDS attack detection

D.

Black and white list

Full Access
Question # 18

In a WLAN network, when the AP is in the monitoring mode, which packet does the AP use to determine the device type?

A.

DHCP

B.

ARP

C.

CAPWAP

D.

802.11MAC

Full Access
Question # 19

When priorities of the active and standby ACs are configured in dual-link HSB mode, a larger priority value indicates a higher priority.

A.

TRUE

B.

FALSE

Full Access
Question # 20

The following is the correct command for creating a static load balancing group?

A.

[AC-wlan-view] regulatory-domain-profile name domain1

B.

[AC-wlan-view] air-scan-profile name wlan-airscan

C.

[AC-wlan-view] rrm-profile name profile-name

D.

[AC-wlan-view] sta-load-balance static-group name static-1

Full Access
Question # 21

The following is a description of the AC roaming group. What is wrong with the statement?

A.

STA can only roam between ACs in the same roaming group.

B.

The ACs of the roaming group encapsulate and transmit roaming related information by using the DTLS extended tunnel.

C.

The Master Controller must be an AC in the roaming group.

D.

The AC of the roaming group needs to deploy a master controller to maintain the membership table of the roaming group.

Full Access
Question # 22

An enterprise needs to upgrade the AC. Which of the following methods is relatively secure to upload upgrade files to the AC?

A.

Use the AC as an SFTP client.

B.

Use the AC as an SFTP server.

C.

Use the AC as an FTP client.

D.

Use the AC as an FTP server.

Full Access
Question # 23

Which of the following methods is recommended to differentiate enterprise employees from guests in wireless admission control scenarios?

A.

Use different user names.

B.

Check whether STA MAC addresses are registered.

C.

Set different SSIDs for employees and guests.

D.

Check the types of STAs they use.

Full Access
Question # 24

As shown in the figure, in a large enterprise WLAN network, the network administrator of the company recently discovered that the WLAN network traffic is abnormal, and the ping gateway has a delay or a large amount of packet loss. After excluding other possibilities, it is suspected that an illegal network attack has occurred. Which kind of illegal attack is the most likely?

A.

Flood attack

B.

Spoof attack

C.

Weak IV attack

D.

Violent cracking

Full Access
Question # 25

Globally, the AC runs the () and () algorithms based on the neighbor relationship, interference, and load information to generate the new transmit power and working channel of the AP.

A.

EDCA

B.

DCA

C.

CAC

D.

TPC

Full Access
Question # 26

What is wrong about the description of the business VAP below?

A.

Provide wireless terminal access

B.

Establish MESH connection establishment

C.

Each RF can be configured in multiples, and the number is not limited.

D.

Each RF can be configured with only one

Full Access
Question # 27

Which of the following APs and STAs cannot communicate with each other? (Multiple Choice)

A.

API and STA1

B.

API and STA2

C.

AP2 and STA1

D.

AP2 and STA2

Full Access
Question # 28

The APs that enable the load balancing function do not need to be connected to the same AC, but the wireless terminal can scan the SSIDs of APs that are load balanced with each other.

A.

Correct

B.

False

Full Access
Question # 29

Which of the following behaviors are WLAN network security threats?

A.

Weak IV attack

B.

WDS

C.

WIDS

D.

WIPS

Full Access
Question # 30

As shown in the figure, in the Mesh networking, what is required to enable the STP spanning tree protocol?

A.

AC G0/0/1 interface

B.

MPP

C.

MP

D.

Switch

Full Access
Question # 31

In the Portal authentication, what parameters must be configured on the AC6005?

A.

Portal server IP address

B.

Portal page URL template

C.

shared-key

D.

Portal protocol version E. The port number on which the device listens for Portal protocol packets.

Full Access
Question # 32

Which of the following statements is TRUE about the Agile Controller admission control model? (Multiple Choice)

A.

The core of the model is the authorization condition and authorization result.

B.

Currently, only 802.1x and Portal authentication support all conditions in the admission control model.

C.

The authorization elements do not include the IP address range.

D.

Authorization conditions include authorization elements.

Full Access
Question # 33

An engineer sets synchronization type to user group-based synchronization, but no information is synchronized to the Agile Controller. The AD directory server works properly, and user and user group information is correct. What may cause the synchronization failure? (Multiple Choice)

A.

Automatic synchronization is configured on the Agile Controller.

B.

The synchronization range is incorrectly configured on the Agile Controller.

C.

The data structure mapping is incorrectly configured for the authentication source.

D.

No OU filtering condition is set on the Agile Controller.

Full Access
Question # 34

Which types of VAP can be created on a Mesh node?

A.

Management VAP and service VAP

B.

Backhaul VAP and default VAP

C.

Service VAP and default VAP

D.

Backhaul VAP and service VAP

Full Access
Question # 35

When the engineer adjusted the directional antenna, it was found that when the antenna was placed away from the other antenna, the signal would drop and the signal would increase slightly. What caused the increase of this signal?

A.

Signal reflection

B.

Frequency harmonics

C.

Sideband

D.

Side lobes

Full Access
Question # 36

What is the protection time for blind handover in smart roaming?

A.

20 minutes

B.

30 minutes

C.

60 minutes

D.

15 minutes

Full Access
Question # 37

As shown in the figure, in the dual-link load balancing hot standby network, AP1 is a new online AP, and both ACs have access configuration. Which AC does AP1 choose to access?

A.

AC1

B.

AC2

C.

Random access

D.

Will not access

Full Access
Question # 38

As shown in the figure, in the dual-link cold backup load balancing network, as shown in the figure, the two SSIDs of the Huawei and the guest are configured on the AC1, and the SSID of the Huawei is configured on the AC2. The same SSID configuration is the same, and AP1 is online. AC1 and AP1 establish the primary line first. After the AP1 is disconnected from the AC1 link and the active/standby switchover is sent, what is the service status of the user accessed by the Guest SSID?

A.

The service in the local forwarding mode is uninterrupted, and new users cannot access the guest.

B.

The service in the local forwarding mode is uninterrupted, and new users can access the guest.

C.

The service is interrupted in the centralized forwarding mode, and new users cannot access the Guest.

D.

The service in the centralized forwarding mode is uninterrupted, and new users cannot access the Guest.

Full Access
Question # 39

When a neighbor passively detects, what information does the legal AP need to collect and report to the AC?

A.

Interference between APs

B.

Interference from illegal APs

C.

Interference from non-Wi-Fi devices

D.

Infrared interference

Full Access
Question # 40

When the STA uses the WPA2-802.1x security policy and supports fast roaming, the STA only needs to perform key negotiation, but does not need to pass 802.lx authentication again during roaming.

A.

TRUE

B.

FALSE

Full Access
Question # 41

To enable STAs to roam between two APs, which of the following conditions must be met? (Multiple Choice)

A.

Same security policy

B.

Same SSID

C.

Same data forwarding mode

D.

Same service VLAN

Full Access
Question # 42

Although the Fresnel zone exists in all RF communication scenarios, its impact is mainly considered in which of the following communications?

A.

Outdoor point-to-point scene

B.

Indoor Mesh scene

C.

Indoor cellular coverage

D.

Outdoor cellular coverage

Full Access
Question # 43

Which of the following processing methods are TRUE, to solve the packet congestion on the tunnel?

(Multiple Choice)

A.

The HAC at the tunnel ingress discards unknown unicast packets.

B.

The HAC discards broadcast or multicast ARP, ND, DHCP, and mDNS packets to prevent loops.

C.

After broadcast/multicast packets are transparently transmitted to the FAC, the FAC converts the packets to unicast packets and forwards the packets over a specific tunnel based on the home AP connected to it.

D.

The FAP discards unknown unicast packets and forwards other packets to roaming STAs.

Full Access
Question # 44

To quickly obtain information about the AC from which an STA goes online, the online status of al ACs in the roaming group and STAs must be saved on each AC.

A.

TRUE

B.

FALSE

Full Access
Question # 45

Which of the following statements about Option 43 in the N+l backup networking are TRUE? (Multiple Choice)

A.

After Option 43 is configured, the AP only unicasts Discovery Request messages to the AC's IP addresses carried in Option 43.

B.

If the AC with the IP address carried in Option 43 does not respond, the AP fails to discover the AC.

C.

When configuring Option 43, you need to specify IP addresses of the active and standby ACs for the AP, and IP addresses of the other active ACs.

D.

The command for setting Option 43 on the DHCP server to IP addresses of the active and standby ACs is option 43 sub-option 2 ip-address ip-address &.

Full Access
Question # 46

In the load balancing mode, what is the correct way for each server to handle hot standby?

A.

The DHCP server does not automatically associate with the relay on the device. The server will send dhcp request packets to the device.

B.

The DHCP server and the relay on the device can be adaptively linked. The server does not actively send protocol packets to the device.

C.

The RADIUS/Portal Server does not need to configure the IP address of the peer device, and the server does not actively send COA/DM or Portal logoff packets to the device.

D.

The RADIUS/Portal Server needs to be configured with the IP address of the peer device, and the server will send the COA/DM or Portal logoff packets to the device.

Full Access
Question # 47

Rogue device prevention is a function that prevents access from rogue APs or STAs using a blacklist,

A.

TRUE

B.

FALSE

Full Access
Question # 48

This figure shows the WIDS attack detection process. After the dynamic blacklist is delivered to an AP, how does the AP process different data traffic during the punish period?

A.

Forward normal data traffic and drop attack traffic

B.

Drop normal data traffic and send attack traffic to the AC

C.

Forward normal data traffic and send attack traffic to the AC

D.

Drop normal data traffic and attack traffic

Full Access
Question # 49

Regarding the precautions for configuring the dual-system hot backup function, the following statement is wrong?

A.

After the dual-link hot backup is configured, you need to use the commit command on the AC to deliver the configuration to the AP.

B.

After the dual-link hot backup is configured, the configuration of the standby AC is complete. After the configuration is complete, the configuration is delivered to the AP.

C.

When dual-link hot backup is configured, the WLAN-related service configuration must be the same for the same APs on the active and standby ACs. Otherwise, the AP cannot work normally after the active/standby status of the AC is switched.

D.

During the active/standby switchover of the dual-link hot backup, the service data that is forwarded by the tunnel is interrupted during this period, and the new users cannot go online.

Full Access
Question # 50

After channel switching without service interruption is configured on an AP, when the AP channel needs to be switched, the AP will notify associated STAs in advance and switch to the new channel with STAs at the same time without interrupting services.

A.

TRUE

B.

FALSE

Full Access
Question # 51

When configuring the connection between the Agile Controller and WLAN, we need to configure a port number if we want to enable Portal, as shown in the following configuration. The default port number is 2000. What is the function of this port number? [AC] web-auth-server listening-port 2000

A.

Destination port number in the packets that the WLAN device sends to the Portal server

B.

Number of the port that WLAN device uses to process Portal protocol packets

C.

Source port number in the packets that the WLAN device sends to the Portal server

D.

Number of the port that the WLAN device uses to receive Portal protocol packets

Full Access
Question # 52

To improve reliability of the CAPWAP link between the AP and AC on a large WLAN, users can set a higher DSCP priority for CAPWAP management packets.

A.

TRUE

B.

FALSE

Full Access
Question # 53

To remain the existing wired network architecture, an enterprise deploys the AC in bypass mode. Considering the large data traffic on the WLAN and needs for AC capacity expansion in the future, it is recommended that the tunnel forwarding mode be used to transmit WLAN services.

A.

TRUE

B.

FALSE

Full Access
Question # 54

In the wireless access authentication, which of the following servers does the Agile Controller have?

A.

AD server

B.

LDAP server

C.

Radius server

D.

DNS server

Full Access
Question # 55

An enterprise building has a large number of employees and they usually connect to the company WLAN in the lobby when arriving at the company. As they move to their work locations, their mobile terminals roam to the current network coverage areas. To ensure that each terminal obtains a fixed IP address, which of the following configurations is recommended?

A.

Configure a VLAN pool and set the VLAN assignment algorithm to hash.

B.

Configure a VLAN pool and set the VLAN assignment algorithm to even.

C.

Configure a VLAN pool and set a VLAN assignment algorithm.

D.

Do not configure a VLAN pool but configure a static IP address for each terminal.

Full Access
Question # 56

As shown in the figure, four STAs (STA1 to STA4) are associated with API and STA5 is associated with AP2. The start threshold for load balancing is set to 5. API and AP2 each allow a maximum of 10 STAs and the load difference threshold is set to 10%. When STA6 sends an association request to API for the first time, which of the following statements is TRUE?

A.

API preferentially uses the load balancing algorithm for calculation and allows the association request from STA6.

B.

API preferentially uses the load difference threshold algorithm for calculation and allows the association request from STA6.

C.

API preferentially uses the load balancing algorithm for calculation and rejects the association request from STA6.

D.

API preferentially uses the load difference threshold algorithm for calculation and rejects the association request from STA6.

Full Access
Question # 57

On the N+1 backup network, AC3 is configured with the global priority of 5, and AC1 and AC2 are configured with the global priority of 6. The AC1 priority is set to 3 on AC1 and the AP3 priority is set to 3 on AC1 and AC2. When AC3 is unloaded, which AC device will AP1, AP2, AP3, and AP4 access?

A.

AP1 is connected to AC1, AP2 is connected to AC3, AP3 is connected to AC2, and AP4 is connected to AC3.

B.

AP1 is connected to AC3, AP2 is connected to AC3, AP3 is connected to AC3, and AP4 is connected to AC1 or AC2.

C.

AP1 is connected to AC1, AP2 is connected to AC1 or AC2, AP3 is connected to AC2, and AP4 is connected to AC1 or AC2.

D.

AP1 is connected to AC3, AP2 is connected to AC1 or AC2, AP3 is connected to AC3, and AP4 is connected to AC3.

Full Access
Question # 58

A large enterprise needs to deploy a WLAN network. The Huawei chassis switch (S77 / 97 / 127) is available on the current network. To reduce the space resources occupied by devices in the equipment room and facilitate the expansion of the WLAN network in the future, users can insert the switch in the frame switch. Insert the AC card into the WLAN network. Which of the following types of ACs can be inserted into the frame switch?

A.

ACU2

B.

AC6605

C.

AC6005

D.

X1E board

Full Access
Question # 59

In the hot standby, the following statement about the HSB backup channel is wrong?

A.

The HSB backup channel between the primary and backup ACs is recommended to be connected separately to ensure high reliability.

B.

The HSB backup combination backup service is independent of each other, and the HSB backup group can work normally without binding.

C.

In the VRRP hot standby, the active/standby status of the HSB backup channel changes with the active/standby status of the VRRP.

D.

Under dual-link hot backup, the HSB channel has no active/standby status, only the data backup channel.

Full Access
Question # 60

A company needs to construct a large WLAN. Since the company has a large number of employees, the service traffic is large. The company may need to expand the WLAN capacity in the future. Which of the following statements are TRUE? (Multiple Choice)

A.

Deploy the ACU2 on the network.

B.

Configure the VLAN pool.

C.

Configure a security policy of high security.

D.

Deploy the AC6005 on the network.

Full Access
Question # 61

In the N+1 backup networking shown in the figure, AC3 is the standby AC of AC1 and AC2. The number of online APs on active AC1 is 1024 and the configured maximum number of online APs allowed on AC1 is 2048. The number of online APs on active AC2 is 512 and the configured maximum number of online APs allowed on AC2 is 512. What is the minimum number of APs allowed to connect to AC3 under normal circumstances, and what is the minimum number of online APs allowed to be configured on AC3?

A.

2048, 1024

B.

1024, 2048

C.

3072, 512

D.

1024, 2560

Full Access
Question # 62

Regarding the MP in the Mesh network, is the following description correct?

A.

MP nodes can also be called Mesh gateways.

B.

The MP node has a Portal function. Through this node, nodes inside the Mesh can communicate with the external network.

C.

MP nodes support automatic topology, automatic route discovery, packet forwarding, etc.

D.

MP nodes can provide both Mesh services and user access services.

Full Access
Question # 63

Which statement about the Mesh profile is FALSE?

A.

All STAs in a Mesh BSS have the same Mesh profile. If two Mesh profiles have the same parameters, the profiles are considered the same.

B.

A Mesh profile contains the following fields: Mesh ID, A path selection protocol identifier (fixed value), and A path selection metric identifier (fixed value).

C.

After a Mesh BSS is set up or an STA joins a BSS, the STA generates a Mesh profile.

D.

An STA will not modify its Mesh profile unless the profile is deleted from the BSS (the STA is a member of the BSS).

Full Access
Question # 64

Which of the following statements about power adjustment is FALSE?

A.

An AP's transmit power determines its radio coverage area. APs with higher power have larger coverage areas.

B.

The global radio calibration algorithm includes the Dynamic Channel Allocation (DCA) algorithm and Transmit Power Control (IPC) algorithm.

C.

A traditional method to control the radio power is to set the transmit power to the maximum value to maximize the radio coverage area. However, a high transmit power may cause interference to other wireless devices.

D.

During dynamic power adjustment, it is necessary to select an optimal power to balance the signal coverage with system capacity.

Full Access
Question # 65

In the WLAN network with WIDS enabled, which of the following statements about device information is wrong?

A.

Device information reporting, short-term reporting, also known as instant reporting cycle

B.

The long period of device information reporting can be set, the minimum is 1 hour.

C.

Short-term reporting is full reporting

D.

The default time for long-term reporting is 5 hours.

Full Access
Question # 66

In the Agile Controller admission control scenario, is the correct description of the role of the RADIUS server/client?

A.

Agile Controller integrates all the functions of the RADIUS server and client.

B.

The Agile Controller functions as the RADIUS server and the user terminal acts as the RADIUS client.

C.

The authentication device (such as 802.1x switch) acts as the RADIUS server and the user terminal acts as the RADIUS client.

D.

The Agile Controller functions as the RADIUS server and the authentication device is the RADIUS client.

Full Access
Question # 67

When the WLAN network supports inter-AC roaming, multiple ACs establish a full connection through the inter-AC tunnel. If the user of the Layer 3 roaming to other ACs can still receive broadcast packets from the original subnet and simply broadcast the broadcast packets to other ACs through the roaming tunnel, a broadcast loop may be formed.

A.

Correct

B.

False

Full Access
Question # 68

On a WLAN network, the AP group name is ap-group and the WIDS template is wids. Now you need to enable the WIDS device counter-function and counter the counterfeit SSID=huawei AP. As shown in the figure, the following configuration is correct?

A.

1>2>4

B.

5>2>3

C.

1>2>3

D.

5>2>4

Full Access
Question # 69

Regarding the Agile Controller admission model, what is the correct description below?

A.

In the admission model, the core is the authorization condition and authorization result

B.

Currently only 802.1x and Portal authentication can support all the conditions in the admission model.

C.

Authorization element does not include IP address range

D.

Authorization conditions include authorization elements

Full Access
Question # 70

What is the correct description of load balancing between dual frequencies?

A.

When the load difference between the 5G and 2.4G radios is within the equalization threshold, the AP will direct the terminal to associate with the 5G.

B.

When the load on the 5G radio exceeds 2.4G at the equalization threshold, the AP will direct the terminal to associate with 2.4G.

C.

When the load on the 5G radio exceeds 2.4G in the equalization threshold, if the terminal is associated with 5G, the AP will always reject the terminal association until the terminal associates 2.4G.

D.

If the load balancing difference threshold is set to 10, it means that if the number of terminals on the 5G radio exceeds more than 10 of the 2.4G radio, the load between the two frequencies is considered to be unbalanced.

Full Access
Question # 71

After CAC based on channel usage is configured to control user access on an AP, if the current channel usage exceeds the configured threshold, the AP will reject access requests of new STAs and force STAs to log out until the channel usage is lower than the threshold.

A.

TRUE

B.

FALSE

Full Access
Question # 72

Which of the following statements about the three backup modes are TRUE? (Multiple Choice)

A.

Dual-link HSB: backs up AP, STA, and CAPWAP link information.

B.

VRRP HSB: backs up AP, STA, and CAPWAP link information.

C.

No matter in hot standby or cold standby mode, a standby AC can provide backup services for only one active AC.

D.

Dual-link backup is a cold backup mode, which does not back up STA information. An AP sets up a link with both the active and standby ACs. During an active/standby switchover or a revertive switchover, STAs need to go online again and services are temporarily interrupted.

Full Access
Question # 73

From the roaming process, which of the following processes does roaming need to go through?

A.

Roaming measurement

B.

Roaming recognition

C.

Roaming decision

D.

Roaming execution

Full Access
Question # 74

As shown in the figure, different companies on adjacent floors of an office building use multiple SSIDs. If a company enables WIDS rogue device countermeasure, APs of other companies will be affected. Which of the following functions can solve this problem?

A.

Dynamic blacklist

B.

WIDS countermeasure mode switching

C.

WIDS bogus SSID detection

D.

WIDS whitelist

Full Access
Question # 75

The following is a description of the wrong description of the chain network in the Mesh network?

A.

In a chained network environment, users can pre-designate neighbors connected to them.

B.

In a chained network environment, users cannot pre-assign neighbors connected to them.

C.

The link formed between the MPs can convert the 802.3 message into an 802.11s message and then transmit it on the wireless link.

D.

In a chained network environment, there may be a single point of failure.

Full Access
Question # 76

In the indoor environment, signal reflection, refraction, diffraction, and scattering of walls and other obstacles are main factors affecting the link quality. The Fresnel zone is also an important factor.

A.

TRUE

B.

FALSE

Full Access
Question # 77

The following description of the Mesh profile is wrong?

A.

In a Mesh BSS, all Mesh STAs have the same Mesh profile. If all the parameters of the Mesh profile are matched, the Mesh profile is considered to be consistent.

B.

Mesh profile contains the following contents, Mesh ID, A path selection protocol identifier (fixed), A path metric identifier (fixed)

C.

After creating a Mesh BSS or becoming a BSS member, a Mesh STA will generate a Mesh profile.

D.

Unless the Mesh profile leaves the Mesh BSS (the Mesh STA is already a member of the Mesh BSS), the Mesh STA does not change its Mesh profile.

Full Access
Question # 78

The following description of the Mesh role is correct?

A.

Mesh role based on RF configuration

B.

Mesh role based on AP configuration

C.

Mesh role based on VAP configuration

D.

Mesh roles can be configured based on any granularity

Full Access
Question # 79

When the user uses the WPA2-802.1x security policy and the STA supports the fast roaming technology, the user does not need to complete the 802.1x authentication process during the roaming process.

A.

Correct

B.

False

Full Access
Question # 80

As shown in the figure, for the partial RF tuning configuration process, regarding the configuration process of RF tuning, what is the correct sorting?

A.

b, a, d, c

B.

b, d, a, c

C.

a, d, b, c

D.

a, b, d, c

Full Access