The channel switching service is not interrupted. When the AP switches channels, the terminal is notified to the terminal in advance, and the time for switching the channel is agreed. When the AP and the terminal switch channels, the service is not interrupted.
As shown in the figure, how do you choose the route from A to D in pro-active mode?
Which of the following statements are TRUE about band steering supported by Huawei devices? (Multiple Choice)
Which of the following statements about the revertive switchover function are TRUE in the N+1 backup scenario? (Multiple Choice)
Which statements are TRUE based on the network of WLAN roaming? (Multiple Choice)
What does the OU in the directory server stand for?
There are three implementations of CAC. What is wrong about the CAC implementation based on channel utilization?
What is the correct description of load balancing between dual frequencies?
As shown in the figure, for the partial RF tuning configuration process, regarding the configuration process of RF tuning, what is the correct sorting?
This figure shows the WIDS attack detection process. After the dynamic blacklist is delivered to an AP, how does the AP process different data traffic during the punish period?
The following is a description of the Mesh route establishment in the pro-active mode?
The online process of an AP includes the following phases. What is the correct sequence of these phases?
1. Decide whether to upgrade the AP.
2. The AP and AC establish a CAPWAP tunnel.
3. The AP goes online, and the AC delivers services to the AP.
4. The AP obtains an IP address,
Taking 5GHz as an example, if the transmitting and receiving antennas are separated by 5km, the radius of the Fresnel zone is roughly?
Which of the following statements about how to enable an HSB group is FALSE?
In smart roaming, the AC instructs the AP to kick off 802.11v-incapable STAs if they are sticky STAs, add them to the blacklist, and delivers the blacklist to the APs to which the STAs associate.
On a layer 2 WLAN, in which modes can an AP discover the AC? (Multiple Choice)
Which of the following methods can implement fast roaming? (Multiple Choice)
The following is the configuration of the URL template when configuring the AC6005 to connect to the Portal server. What is wrong with the following statement? Url-template name huawei url url-parameter ssid ssid
Which are the correct procedures for a Mesh node going online through an AC? (Multiple Choice)
An engineer wants to modify the user information on the Agile Controller, but finds that it cannot be modified. What are the possible reasons?
According to the process of establishing a mesh connection, the following steps are correct?
When a large-scale enterprise deploys a WLAN Layer 3 network, you need to configure the Option 43 field on the Windows 2003 DHCP server to notify the AP of the IP address of the AC. The IP address of the AC is 10.23.100.1. Which of the following is required in the Option 43 field on the DHCP server?
A company needs to construct a large WLAN. Since the company has a large number of employees, the service traffic is large. The company may need to expand the WLAN capacity in the future. Which of the following statements are TRUE? (Multiple Choice)
Which statements about roaming are TRUE? (Multiple Choice)
The following description of load balancing is correct?
In the dual-link cold backup networking diagram shown in the figure, API goes online, and APs are allowed to connect to both ACs. Which AC will API connect to?
Which statement about STP on a Mesh network is FALSE?
Which of the following statements about the three backup modes are TRUE? (Multiple Choice)
What are the methods for breaking the multi-MPP network in Huawei?
In the N+1 backup networking, the following is true about the application of option 43?
Which statement about roaming group is FALSE?
If you are roaming between two APs, which of the following must be met?
After setting up tunnels with the active and standby ACs, the AP sends Echo messages to monitor tunnel status. The Echo messages contain the active/standby status of the tunnels. When the AP detects that the primary tunnel fails, it sends an Echo Request message with the active flag to the standby AC. After receiving the Echo Request message, the standby AC becomes the active AC, and the AP sends STA data to this AC.
When the dual-link hot standby switchover is performed, what is the correct behavior about the AP and the user?
When the air interface frame is a management frame, when the Capability Info field ESS and IBSS bits in the management frame are, can the device be determined to be a wireless bridge?
The Agile Controller can synchronize data either manually or automatically. Which of the following statements is TRUE about the two synchronization modes?
During dual-link hot backup, the AP establishes a CAPWAP link with both the primary AC and the backup AC.
The following is true about the global tuning algorithm?
The “5W” in “5W1H” in the Agile Controller function introduction refers to: Who is connected to the network; Where is the access from the network; When is the time access; Why is the access; What is the device access.
Which statements about Layer 2 and Layer 3 roaming are TRUE? (Multiple Choice)
The following statement about the proactive detection of neighbors is wrong?
Which of the following statements about the second Fresnel zone are TRUE? (Multiple Choice)
Which of the following statements about global calibration algorithms are TRUE? (Multiple Choice)
What is the correct statement about the Mesh RF parameters?
Which of the following statements about the HSB solution are TRUE?
When configuring the connection between the Agile Controller and WLAN, we need to configure a port number if we want to enable Portal, as shown in the following configuration. The default port number is 2000. What is the function of this port number? [AC] web-auth-server listening-port 2000
Which of the following illegal attack detections require dynamic blacklist support in a WLAN network?
An AP detects brute force attacks by checking whether the number of key negotiation failures during the WPA/WPA2-PSK, WAPI-PSK or WEP-Share-Key authentication exceeds the configured threshold.
Which is the correct sequence for selecting a proper AP for 802.Ilk-capable STAs in smart roaming?
1. Determine whether latency-sensitive services exist.
2. Filter out APs that do not support load balancing.
3. Filter out APs that do not meet the CAC requirement.
4. Select the AP with the strongest signal strength as the target AP.
5. Select APs meeting the difference threshold conditions.
What are the benefits of intelligent roaming?
Which of the following statements about rogue devices are TRUE? (Multiple Choice)
Which statement about smart roaming is FALSE?
Which of the following measures are beneficial to guide wireless terminals to preferentially associate 5G bands?
Which of the following factors should be considered when engineers determine the antenna installation height in the long-distance point-to-point scenario? (Multiple Choice)
What information can the Agile Controller deliver to the NAS device for right control? (Multiple Choice)
As shown in the figure, the WIDS attack detection process, after completing the dynamic blacklist, how does the AP handle different data traffic when it is in the blacklist penalty period?
As shown in the figure, four STAs (STA1 to STA4) are associated with API and STA5 is associated with AP2. The start threshold for load balancing is set to 5. API and AP2 each allow a maximum of 10 STAs and the load difference threshold is set to 10%. When STA6 sends an association request to API for the first time, which of the following statements is TRUE?
Which of the following is the Mesh network role?
On a WLAN network, which of the following attacks will trigger alarms? (Multiple Choice)
What are the advantages of a WLAN Mesh network over a traditional WLAN?
Which is the correct procedure of Mesh link establishment?
A)
B)
C)
D)
There are two algorithms for assigning VLAM in VLAN Pool: sequential algorithm and hash algorithm. Which of the following are the characteristics of Hash algorithm?
Which of the followings are implementation modes of CAC? (Multiple Choice)
In a WLAN network environment, after a Spoof spoofing attack, the attacking terminal cannot be determined by the MAC address.
Regarding the parameter DN in the directory server, is the following description correct?
In the dual-link cold networking, the following statement is correct?
What is wrong with the following statement about power adjustment?
If time is specified as an authorization element, what is the purpose of configuring time in authentication and authorization rules?
Rogue device prevention is a function that prevents access from rogue APs or STAs using a blacklist,
What is the correct formula for the Fresnel radius formula and the Earth curvature formula below?
The following is the correct command for creating a static load balancing group?
In the WLAN network, the Weak IV attack detection function does not require dynamic blacklist support.
When the air interface frame is a data frame, you need to compare the DS value. What is the ratio of To DS and From DS? Is the device type AP?
Regarding the process of the Mesh node going online on the AC, is the following description correct?
Which are the omnidirectional antenna patterns? (Multiple Choice)
Which statement about the Mesh profile is FALSE?
Which of the following APs and STAs cannot communicate with each other? (Multiple Choice)
Which of the following methods does RF tuning include?
Which of the following servers is the directory server?
Which of the following processing methods are TRUE, to solve the packet congestion on the tunnel?
(Multiple Choice)