Huawei H12-321_V1.0-ENU HCIP-WLAN-CEWA V1.0 Online Training
Huawei H12-321_V1.0-ENU Online Training
The questions for H12-321_V1.0-ENU were last updated at Dec 25,2024.
- Exam Code: H12-321_V1.0-ENU
- Exam Name: HCIP-WLAN-CEWA V1.0
- Certification Provider: Huawei
- Latest update: Dec 25,2024
During the MAC authentication process, the user does not need to manually enter the user name and password, and can authenticate terminals that do not have 802.1X authentication capabilities, such as printers and fax machines.
- A . True
- B . False
The Portal protocol message consists of a fixed-length header and a variable-length attribute field, and the attribute field adopts the TLV (Type-Length-Value) format.
- A . True
- B . False
Agile controller supports synchronizing user groups and users with AD and other standard LDAP servers. The same LDAP data source does not support the synchronization of accounts with the same name. If there are accounts with the same name, only the first synchronized account can be successfully synchronized, and the subsequent synchronized accounts will fail to be synchronized.
- A . True
- B . False
Which of the following descriptions about enabling the HSB backup group in the hot backup scheme is wrong?
- A . After the HSB backup group is enabled, the relevant configuration of the HSB backup group will take effect, and the H5B backup group will notify the corresponding business module for processing when the state changes
- B . During the device response period (that is, when batch backup is performed between the active and standby devices), it is not allowed to disable the H5B active and standby backup group function
- C . After the HSB backup group configuration is complete, enable the HSB active/standby backup function
- D . You can directly enable the HSB backup group in global mode
In the reliability scenario, when the number of public configurations to be synchronized in the Master AC cache reaches 1000, the user will not be able to continue configuring the public configurations, and the configuration can only be continued after the configuration is deleted.
- A . True
- B . False
In wireless communication scenarios, in order to ensure the reliability of signal transmission, it is usually necessary to consider the design and planning of the Fresnel area. In principle, try not to block the first Fresnel area. Which of the following scenarios should be most considered for Fresnel zone design?
- A . Indoor Cellular Coverage
- B . Outdoor point-to-point scene
- C . Indoor mesh scene
- D . Outdoor Cellular Coverage
In the direct forwarding mode of the WLAN network, after the user roams, the ARP entry of the access device connected to the AP does not age out in time, which will cause a short interruption of the user service. To solve this problem, which of the following commands should the engineer configure?
- A . <WAC>system-view
[WAC] wlan
[WAC-wlan-view] ap-group name default
[WAC-wlan-vap-group-default] undo learn-client-address ipv4 disable
[WAC-wlan-vap-prof-default] quit - B . <TAC>system view
[WAC] wlan
[WAC-wlan-view] vap-profile name default
[WAC-wlan-vap-prof-default] learn-client-address ipv4 disable
[WAC-wlan-vap-prof-default] quit - C . <WAC>system-view
[WAC] wlan
[WAC-wlan-view] vap-profile name default
[WAC-wlan-vap-prof-default] undo learn-client-address ipv4 disable
[WAC-wlan-vap-prof-default] quit - D . <WAC>system-view
[WAC] wlan
[WAC-wlan-view] ap-group name default
[WAC-wlan-vap-prof-default] undo learn-client-address ipv4 disable
[WAC-wlan-vap-prof-default] quit
There are three implementation methods of CAC. Which of the following options does not belong to the implementation method of CAC?
- A . Based on terminal SNR
- B . Based on the number of users
- C . Based on user rate
- D . Based on channel utilization
In point-to-multipoint Mesh scenarios, both omnidirectional antennas and directional antennas will be used. In point-to-point Mesh scenarios, directional antennas are generally used.
- A . TRUE
- B . FALSE
The two IPs that implement WLAN roaming must use the same SSID and security template (the name of the security template can be different, but the configuration under the security template must be the same), and the authentication mode and authentication parameters of the authentication board must also be configured the same.
- A . True
- B . False