In a dual-link backup scenario, the active/standby link switchover mode is set to priority. When the active link recovers, the AP detects that the original active link has a higher priority and triggers a switchback. How many Echo intervals does the AP wait for before switching back to the original primary WAC?
In a dual-link HSB scenario, after an AP sets up a CAPWAP links with the active and standby WACs, which of the following types of packets does the AP periodically send to the WACs to detect link status?
ADTLS
BJoin
CEcho
DKeepalive
To which of the following scenarios is radio calibration applicable? (Choose all that apply.)
AEnterprise office scenario
BRail transportation scenario
CHigh-density scenario
DWDS or mesh backhaul scenario
Which of the following statements about EAP relay and EAP termination are false? (Choose all that apply.)
AIn EAP termination mode, an access device encapsulates EAP packets sent by an 802.1X client into RADIUS packets, without processing the data in the EAP packets.
BIn EAP relay mode, an access device extracts information from EAP packets, encapsulates the information into RADIUS packets, and sends the RADIUS packets to an authentication server.
CIn EAP termination mode, an access device extracts client authentication information from the EAP packets sent by a client and encapsulates the information using the standard RADIUS protocol. The access device supports only the EAP MD5-Challenge authentication method.
DThe EAP termination mode simplifies the processing on an access device and supports various authentication methods. However, this mode requires an authentication server to support EAP and have high processing capability.
Which of the following encapsulation formats are used for EAP termination in 802.1X authentication?
AEAP-TLS
BEAPoL
CEAPoR
DEAP
Question 6
WLAN Technologies and Protocols
0
Question 7
WLAN Planning and Design
Question 9
WLAN Planning and Design
Question 10
WLAN Security
Question 11
WLAN Security
Question 12
WLAN Technologies and Protocols
Question 13
WLAN Technologies and Protocols
Question 14
WLAN O&M and Troubleshooting
Question 15
WLAN O&M and Troubleshooting
Question 16
WLAN Technologies and Protocols
Question 17
WLAN Security
Question 18
WLAN Security
Question 19
WLAN Technologies and Protocols
Question 20
WLAN Technologies and Protocols
Question 21
WLAN Deployment and Commissioning
Question 22
WLAN Technologies and Protocols
Question 23
WLAN Security
Question 24
WLAN Security
Question 25
WLAN Planning and Design
Question 26
WLAN Planning and Design
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Which of the following advantages does BSS coloring provide in Wi-Fi 6?
AHigher packet rate on the air interface
BEnhanced encryption on the air interface
CMore efficient channel use
DHigher concurrency in high-density scenarios
Which of the following tools are commonly used for WLAN network planning, acceptance, or health evaluation? (Choose all that apply.)
AWLAN Planner
BiMaster NCE-CampusInsight
CeDesk
DCloudCampus APP
Which of the following items is not involved in the HLD phase?
ACapacity planning
BNetwork design
CAP position planning
DDeployment planning
In 802.1X authentication using port-based access control, once a user is authenticated successfully on a port, subsequent users on this port can access the network without authentication. When the authenticated user goes offline, all other users are denied access to the network.
ATrue
BFalse
Which of the following methods are used in IPsec to ensure secure transmission of service data on the network through encryption and authentication? (Choose all that apply.)
AThe receiver verifies the identity of the sender
BThe receiver rejects old or duplicate packets in order to prevent attacks initiated by malicious users who resend sniffed packets
CThe sender verifies the identity of the receiver
DData integrity is verified
Either of the two APs that have established a mesh connection can send a Mesh Peering Close frame to the other AP to tear down the mesh connection.
ATrue
BFalse
DRAG DROP -
In mesh networking, APs have different roles. Drag the AP roles on the left to the role descriptions on the right.
The display sync-configuration compare command is executed on the backup WAC in HSB to check wireless configuration synchronization. Based on the command output, which of the following statements are true? (Choose all that apply.)
<WAC> display sync-configuration compare
<WAC>--- /tmp/master-common-cfg.cfg
+++ /tmp/backup-common-cfg.cfg
@@ -214,59 +214,6 @@
forward-mode tunnel
service-vlan vlan-id 102
ssid-profile 2
vap-profile name 2
forward-mode tunnel
service-vlan vlan-id 102
ssid-profile IR2D
vap-profile name 3
forward-mode tunnel
service-vlan vlan-id 102
ssid-profile 3
@@ -287,70 +234,21 @@
AThis command is used to check whether the public configurations on two WACs are consistent after wireless configuration synchronization.
BThe configuration of ssid-profile 2 exists on both the master and backup WACs.
CThe configuration of vap-profile name 3 exists on the master WAC but not on the backup WAC.
DThe configuration of vap-profile name 2 exists on the backup WAC but not on the master WAC.
iMaster NCE-CampusInsight analyzes network issues during correlation analysis of poor-QoE clients, including coverage, interference, throughput, and hardware issues.
ATrue
BFalse
Which of the followings is not a roaming optimization solution?
AProactive roaming
BSmart roaming
CFast roaming using PMK caching
D802.11r roaming
Which of the following statements about attack defense is true?
ADefense against flood attacks can be used to defend against Ping of Death attacks.
BAttack defense allows APs to analyze the contents and behaviors of incoming packets on ports to determine whether packets have attack characteristics. The APs then take defense measures on the packets that have attack characteristics.
CAttack defense can defend against spoofing packet attacks, malformed packet attacks, fragmentation attacks, and flood attacks.
DFragmentation attack defense enables a device to detect packet fragments in real time and discard or rate-limit them to protect the device.
Assume that a large enterprise needs to deploy a WLAN to provide wireless access for both employees and guests. However, guest data may pose security threats on the network. Which of the following networking modes is applicable to this scenario?
ANavi WAC Networking
BLeader AP networking
CMesh networking
DFat AP networking
DRAG DROP -
802.11r fast roaming (over-the-air) is enabled on the WLAN shown in the figure. A STA roams from AP1 to AP2. Sort the steps in chronological order during the 802.11r fast roaming process between WACs.
In Huawei’s smart roaming solution, which of the following methods can be used by a WAC to discover and maintain neighboring AP entries of STAs?
AThe WAC obtains such entries using 802.11v
BThe AP listens to the Probe frames sent by STAs
CThe AP periodically and proactively scans neighboring APs of STAs
DSTAs proactively report neighboring AP information
As shown in the figure, STA_1 through STA_4 are associated with AP_1, and STA_5 is associated with AP_2. Assuming that the load balancing threshold is 2, the load difference threshold is 25%, and AP1 and AP2 support a maximum of 10 STAs, which of the following statements are true?
AThe load percentage of AP_1 is 40%, and that of AP_2 is 10%.
BThe load balancing mechanism needs to be enabled. Then some STAs are steered from AP_1 to AP_2.
CIf load balancing is performed, the load percentage of AP_1 changes to 30%.
DThe minimum load percentage is 10%, which is greater than the load difference threshold. Therefore, load balancing needs to be enabled.
In a multicast solution, there must be reachable unicast routes between multicast sources and receivers.
ATrue
BFalse
To enable WPA3-incapable STAs to access a WPA3-configured network, the Wi-Fi Alliance defines the WPA3 transition mode in which WPA3 and WPA2 can coexist for a period of time in the future. This mode applies only to WPA3-Enterprise, not to WPA3-Personal.
ATrue
BFalse
Which of the following statements correctly arranges matching modes used by URL filtering in descending order of priority?
Which of the following statements are true about the WLAN site survey in different typical scenarios?
AIn a classroom scenario, if the walls are made of reinforced concrete, the signal attenuation is high. In this case, you are advised to test the attenuation during the site survey. Additionally, pay attention to the locations of ELV rooms in the teaching building.
BIn an office scenario, the load-bearing columns and partitions affect the signal coverage. If an integrated ceiling is used, deploy APs near maintenance entrances. If a metal ceiling is used, mount APs on the ceiling or wall.
CIn a ward-round scenario, high requirements are posed on the coverage field strength, roaming effect, and bandwidth. Determine the interference of medical equipment and the areas where Wi-Fi signals are not allowed.
DIn a stadium scenario, the onsite environment is complex and cabling is difficult. Therefore, confirm with the property management company about ELV rooms and cabling. If the transmission distance is too long, consider deploying more switches. During the survey, focus on the interference between APs and AP mounting modes.
When calculating the number of APs, you can divide the total required bandwidth by the maximum bandwidth of a single AP.