Which of the following descriptions about omnidirectional antennas is wrong?
- A . The omnidirectional antenna distributes the signal evenly in a 360-degree omnidirectional area around the center point
- B . The lobe width of the omnidirectional antenna is 360 degrees horizontally
- C . The omnidirectional antenna has strong energy gathering ability and good signal direction
- D . The lobe width of the omnidirectional antenna is 360 degrees vertically
Regarding the parameter DN in the directory server, which of the following descriptions is correct?
- A . Each directory server has the parameter DN
- B . The DN parameter is only available in the LDAP server
- C . DN is a parameter that needs to be manually configured by the directory server administrator
- D . The DN parameter is only available in the AD server
Regarding the address of the AP connecting to the AC in VRRP hot backup, which statement is correct?
- A . The address where the AP accesses the AC is the physical address of the primary AC
- B . The address where the AP accesses the AC is the physical address of the standby AC
- C . The address where the AP accesses the AC is the master, and the virtual address of the backup AC
- D . Any address configured in AC is fine
Which of the following descriptions about directional antennas is wrong?
- A . Directional antennas are radiated in a certain angle range on the horizontal pattern, which is commonly referred to as directional antennas.
- B . The directional antenna has the strongest energy gathering ability, and the direction of the signal is excellent
- C . When the number of remote link points is small, or the angle and orientation are quite concentrated, the use of directional antennas is the most effective solution
- D . Only the main lobe of the directional antenna has practical use, so the side lobe can be ignored
In wireless access authentication, Agile Controller can support multiple authentication methods. Which of the following descriptions about Agile Controller authentication is wrong?
- A . Does not support MAC bypass authentication
- B . Support 802.1x authentication
- C . Support Portal authentication
- D . Multiple authentication methods can be used to authenticate users
Which of the following statements about the role of Mesh is correct?
- A . Mesh roles are based on radio configurations
- B . Mesh role based on AP configuration
- C . Mesh role based on VAP configuration
- D . Mesh roles can be configured based on arbitrary granularity
Which of the following statements about Portal authentication is correct?
- A . Client can be used for Portal authentication
- B . Portal authentication cannot be used together with 802.1x authentication
- C . The real-time billing cycle of Portal authentication is adjusted based on the number of APs
- D . Portal authentication does not involve RADIUS authentication
According to the detection results reported by the AP, the AC can obtain the neighbor relationship between the AP and surrounding devices, as well as the neighbor relationship of all radio frequency devices (including legal APs, illegal APs, and non-Wi-Fi interference devices) under the entire AC, as shown in the following figure: In order to prevent the reported data from being too large, only legal neighbors whose signal strength is greater than -85dBm and illegal neighbors whose signal strength is greater than ()dBm are reported here?
- A . -75
- B . -80
- C . -85
- D . -90
In smart roaming, for a terminal that does not support 802.11v or a terminal that falsely supports 802.11v, the AC notifies the current AP to log the sticky user offline, and sends a blacklist to the currently associated AP.
- A . True
- B . False
In a WLAN project, when the engineer was upgrading the AC, the AC system was damaged due to an unexpected power failure. At this time, which of the following methods can be used to re-upgrade the AC?
- A . Command line upgrade
- B . Web network management upgrade
- C . Boot upgrade
- D . eSight network management upgrade
Which of the following commands about creating a static load balancing group is correct?
- A . [AC-wlan-view] regulatory-domain-profile name domain1
- B . [AC-wlan-view] air-scan-profile name wlan-airscan
- C . [AC-wlan-view] rrm-profile name profile-name
- D . [AC-wlan-view] sta-load-balance static-group name static-1
Taking 5GHz as an example, if the transmitting and receiving antennas are 5km apart, the radius of the Fresnel area is approximately?
- A . 3.6m
- B . 5.6m
- C . 8m
- D . 9.7m
In smart roaming, for a terminal that supports 802.1v, the AP can designate a target AP for it and require it to actively roam without kicking the user offline.
- A . True
- B . False
Regarding the relationship between 802.1x and RADIUS, which of the following descriptions is correct?
- A . 802.1x and RADIUS are different names for the same technology
- B . 802.1x is a technical system that includes RADIUS
- C . 802.1x and RADIUS are different technologies, but they are often used together to complete the access control of end users
- D . 802.1x and RADIUS are two completely different technologies and are usually not used together
According to the process of establishing a Mesh connection, which of the following steps is correct?
- A . 4-3-2-1
- B . 4-2-3-1
- C . 2-3-4-1
- D . 2-4-3-1
The antenna is different from the signal amplifier. It is a passive device that does not need power supply, but only guides and shapes wireless signals.
- A . True
- B . False
Which of the following commands can check whether the automatic selection function of the AP channel and transmit power is enabled?
- A . [AC-wlan-view] display station ssid wlan-net
- B . [AC-wlan-view] display rrm-profile name profile-name
- C . [AC-wlan-view] display radio all
- D . [AC-wlan-view] display yap-profile name profile-name
Which of the following formulas about the curvature of the earth is correct?
- A . a
- B . b
- C . c
- D . d
In smart roaming, terminals that support 802.11k can actively collect surrounding neighbor AP information and report it to the associated AP.
- A . True
- B . False
As shown in the figure, in public places, such as different companies on adjacent floors in an office building, there are multiple SSIDs. After a company turns on the WIDS illegal device counter function, it will counter other companies’ APs. Which of the following function can effectively solve this problem?
- A . Dynamic blacklist function
- B . WIDS countermeasure mode switching
- C . WIDS counterfeit SSID detection
- D . WIDS whitelist function
As shown in the figure, the WIDS attack detection process is shown. After the dynamic blacklist is issued, how will the AP handle different data traffic during the blacklist penalty period?
- A . Forward normal data traffic and drop attack traffic
- B . Discard normal data traffic and report attack traffic
- C . Forward normal data traffic and report attack traffic
- D . Discard normal data traffic and discard attack traffic
Regarding the definition of WIPS/WIDS, which of the following statements is correct?
- A . WIDS is Wireless Intrusion Prevention System
- B . WIPS is Wireless Intrusion Detection System
- C . WIDS is Wireless Intrusion Countermeasure System
- D . WIPS is Wireless Intrusion Prevention System
Regarding the dual-link hot standby configuration, when configuring the priority of an AC, the greater the value of the priority, the higher the actual priority of the AC.
- A . True
- B . False
Which of the following commands is not required when configuring the Mesh whitelist?
- A . radio radio-id
- B . ap-system-profile
- C . mesh-whitelist-profile
- D . peer-ap mac
A large-scale WLAN network needs to deploy a wired and wireless integrated network to achieve unified management and maintenance of users. Which of the following ACs is recommended?
- A . S12700 switch + ACU2
- B . AC6605
- C . AC6005
- D . S12700 switch + X1E board
In the uninterrupted feature of channel switching, the mechanism of notifying the terminal to switch channels is defined by the 802.11h protocol.
- A . True
- B . False
In the feature of uninterrupted channel switching service, the AP and the terminal agree on the time to switch the channel synchronously, taking the beacon frame as the time point, and the two parties agree to switch the channel synchronously after a certain time node of the beacon frame.
- A . True
- B . False
According to different scenarios, the AC or AP can be set as the home agent in the layer-3 roaming of the direct forwarding network. When an AP is set as a home agent, tunnel forwarding needs to be established directly between APs before and after roaming, without forwarding through the AC.
- A . True
- B . False
Both N+1 backup and dual-link cold backup support the link switchback function. In order to avoid frequent switching caused by network shocks, N+1 backup and dual-link cold backup wait for 20 heartbeat cycles by default. Master/standby switchover operation.
- A . True
- B . False
In the N+1 backup or dual-link cold backup networking scenario, configuring the CAPWAP heartbeat detection interval and times to be smaller can effectively improve the service interruption time when the main link is abnormal, and does not affect the reliability of the CAPWAP link.
- A . True
- B . False
Taking 5GHz as an example, if the transmitting and receiving antennas are 1km apart, the radius of the Fresnel area is approximately?
- A . 2.4m
- B . 3.6m
- C . 5.6m
- D . 6.2m
In a small campus WLAN networking scenario, in the CAPWAP tunnel establishment process, which of the following steps may not be performed by the AP and AC?
- A . AP and AC exchange echo packets
- B . AP and AC exchange join messages
- C . AP and AC exchange image data packets
- D . AP and AC exchange keepalive packets
The data algorithm of WEP encryption adopts () algorithm.
- A . RC4
- B . AES
- C . CCMP
- D . Asymmetric encryption
The lobe width is a very important parameter commonly used in directional antennas. It refers to the width of the angle formed by the radiation pattern of the antenna below the peak () dB.
- A . 3
- B . 4
- C . 5
- D . 6
Four APs are deployed in a conference room that can accommodate up to 100 people. By configuring the CAC function on each AP, the number of users of a single AP cannot exceed 25, and the SSID will be hidden after exceeding. Thus, the effect of load balancing among APs is indirectly realized.
- A . True
- B . False
In a customer’s wireless network, Portal authentication is used for user authentication. The engineer configures Portal authentication on the Huawei wireless controller, involving Portal authentication templates, authentication-free templates, and authentication templates.
Which of the following descriptions about the certification-free template is wrong?
- A . When multiple authentication-free rules are configured at the same time, they can take effect cumulatively and match one by one
- B . The authentication-free template can invoke IPv4 ACL and IPv6 ACL
- C . The authentication-free template can only release the specified IP address through ACL calls
- D . Authentication-free authorization information is only valid for Portal authenticated users
Which of the following terminals is most suitable to use MAC authentication to access the wireless network?
- A . Windows PC
- B . Webcam
- C . Linux PC
- D . smartphone
A company needs to hold a temporary product launch event. Since there is no wired network foundation at the launch site and time is tight, the network engineer plans to use wireless Mesh networking.
Which of the following descriptions about deploying a Mesh network is wrong?
- A . Mesh links can be established between MPP and MP nodes in the Mesh network, and Mesh links can also be established between MP and MP nodes.
- B . Mesh link is usually recommended to use 5G radio frequency interface to establish, not recommended to use 2.4G radio frequency interface
- C . The Mesh link can use the DFS channel. When a radar signal is detected, the channel will automatically switch, and the wireless service will not be interrupted.
- D . When a new AP is added to the Mesh network, the AP can automatically discover the network topology and determine the best transmission path after it goes online
The Mesh network supports AP zero-configuration online, that is, the AP does not need to do any configuration on the AP and AC before going online, and the AP can go online after ensuring that the AP and AC network is reachable.
- A . True
- B . False
In a large-scale campus WLAN networking scenario, the administrator needs to manually configure a static IP address for the AP during the first step of going online.
- A . True
- B . False
During the MAC authentication process, the user does not need to manually enter the user name and password, and can authenticate terminals that do not have 802.1X authentication capabilities, such as printers and fax machines.
- A . True
- B . False
The Portal protocol message consists of a fixed-length header and a variable-length attribute field, and the attribute field adopts the TLV (Type-Length-Value) format.
- A . True
- B . False
Agile controller supports synchronizing user groups and users with AD and other standard LDAP servers. The same LDAP data source does not support the synchronization of accounts with the same name. If there are accounts with the same name, only the first synchronized account can be successfully synchronized, and the subsequent synchronized accounts will fail to be synchronized.
- A . True
- B . False
Which of the following descriptions about enabling the HSB backup group in the hot backup scheme is wrong?
- A . After the HSB backup group is enabled, the relevant configuration of the HSB backup group will take effect, and the H5B backup group will notify the corresponding business module for processing when the state changes
- B . During the device response period (that is, when batch backup is performed between the active and standby devices), it is not allowed to disable the H5B active and standby backup group function
- C . After the HSB backup group configuration is complete, enable the HSB active/standby backup function
- D . You can directly enable the HSB backup group in global mode
In the reliability scenario, when the number of public configurations to be synchronized in the Master AC cache reaches 1000, the user will not be able to continue configuring the public configurations, and the configuration can only be continued after the configuration is deleted.
- A . True
- B . False
In wireless communication scenarios, in order to ensure the reliability of signal transmission, it is usually necessary to consider the design and planning of the Fresnel area. In principle, try not to block the first Fresnel area. Which of the following scenarios should be most considered for Fresnel zone design?
- A . Indoor Cellular Coverage
- B . Outdoor point-to-point scene
- C . Indoor mesh scene
- D . Outdoor Cellular Coverage
In the direct forwarding mode of the WLAN network, after the user roams, the ARP entry of the access device connected to the AP does not age out in time, which will cause a short interruption of the user service. To solve this problem, which of the following commands should the engineer configure?
- A . <WAC>system-view
[WAC] wlan
[WAC-wlan-view] ap-group name default
[WAC-wlan-vap-group-default] undo learn-client-address ipv4 disable
[WAC-wlan-vap-prof-default] quit - B . <TAC>system view
[WAC] wlan
[WAC-wlan-view] vap-profile name default
[WAC-wlan-vap-prof-default] learn-client-address ipv4 disable
[WAC-wlan-vap-prof-default] quit - C . <WAC>system-view
[WAC] wlan
[WAC-wlan-view] vap-profile name default
[WAC-wlan-vap-prof-default] undo learn-client-address ipv4 disable
[WAC-wlan-vap-prof-default] quit - D . <WAC>system-view
[WAC] wlan
[WAC-wlan-view] ap-group name default
[WAC-wlan-vap-prof-default] undo learn-client-address ipv4 disable
[WAC-wlan-vap-prof-default] quit
There are three implementation methods of CAC. Which of the following options does not belong to the implementation method of CAC?
- A . Based on terminal SNR
- B . Based on the number of users
- C . Based on user rate
- D . Based on channel utilization
In point-to-multipoint Mesh scenarios, both omnidirectional antennas and directional antennas will be used. In point-to-point Mesh scenarios, directional antennas are generally used.
- A . TRUE
- B . FALSE
The two IPs that implement WLAN roaming must use the same SSID and security template (the name of the security template can be different, but the configuration under the security template must be the same), and the authentication mode and authentication parameters of the authentication board must also be configured the same.
- A . True
- B . False
The available channels are different in different countries or regions, and some regions will reserve some channels, so it must be confirmed clearly before planning. Taking China as an example, the 6-band optional channels used by the bridge backhaul include: 36, 149, 153, 157, 161 and 165.
- A . True
- B . False
In order to enable visitors to access the Internet through the WLAN network, the global pool is used to assign addresses to users. Which of the following is not required to be configured?
- A . Gateway-list
- B . Network
- C . Option 43 sub-option 3
- D . DNS-list
In the WDS+ dual-link scenario, the number of heartbeat packet detections should be set to ?
- A . 1
- B . 3
- C . 9
- D . 6
Which of the following descriptions about the steps of using the WLAN Tester2.0 tool for site survey is correct?
- A . Create a new project ->set scale->import drawing->load network card->start->end
- B . Create a new project->import drawing->set scale->load network card->start->dot->end
- C . Create a new project ->import drawing->load network card-→set scale->start->dot->end
- D . Create a new project->import drawing->set scale->start->dot->end
Which of the following descriptions about side-mounted networking is wrong?
- A . Service traffic using direct forwarding must pass through the AC
- B . The side-mounted networking belongs to the superposition mode of the existing network, and there is little modification to the existing network
- C . The traffic forwarded by the tunnel must pass through the AC
- D . Regardless of whether it is direct forwarding or direct forwarding, the management traffic of the AP will pass through the AC
Commonly used authentication methods in EAP relay mode include EAP-PEAP, EAP-TLS and EAP-ITLS. Among them, EAP-TTLS needs to load certificates on both the client and the server, and has the highest security.
- A . TRUE
- B . FALSE
In the dual-link hot backup scheme, a single AP establishes CAPTAP links with the active and standby TACs respectively. One is the active link and the other is the standby link. The TAC does not back up synchronization information. After the active TAC fails, the AP switches to the standby link On, prepare WAC to take over the work.
- A . TRUE
- B . FALSE
Lobe width is an important index commonly used for directional antennas. The wider the wave width, the better the directivity, the farther the working distance, and the stronger the anti-interference ability.
- A . True
- B . False
In the 802.11 standard, the unicast frame sent must be confirmed by CK, otherwise the frame will be considered lost.
- A . TRUE
- B . FALSE
In the WAC+FIT AP networking architecture, the AP will go through multiple stages during the online process. The different stages are sorted in chronological order. Which one is the correct one?
- A . AP obtains IP address -> NAC detects whether AP software version needs to be upgraded -> AP and WAC establish CAPWAP tunnel -> AP goes online -> WAC sends service configuration to AP
- B . AP obtains IP address -> AP and AC establish CAPWAP tunnel -> WAC checks whether AP software version needs to be upgraded -> WAC sends service configuration to AP -> AP goes online
- C . AP obtains IP address -> AP and WAC establish CAPWAP tunnel -> AC detects whether the AP software version needs to be upgraded -> AP goes online -> WAC delivers service configuration to AP
- D . AP obtains IP address -> AP and WAC establish CAPWAP tunnel -> AP goes online -> WAC sends service configuration to AP -> WAC checks whether AP software version needs to be upgraded
- E . AP obtains IP address -> WAC detects whether the AP software version needs to be upgraded -> AP and WAC establish CAPWAP tunnel -> WAC sends service configuration to AP -> AP goes online