Which are the angles allowed between two MPs?
In the figure, the main lobe width of the directional antenna is 31°. Which are the angles allowed between two MPs? (Multiple Choice) A . 20°B . 30°C . 40°D . 60°View AnswerAnswer: AB
Which of the following STAs does MAC address authentication suit the most?
Which of the following STAs does MAC address authentication suit the most?A . Office PC running a Windows OSB . Testing PC running a Linux systemC . Mobile terminal, such as a smartphoneD . Network printerView AnswerAnswer: D
Which of the following operations performed by network engineers are CORRECT during WLAN planning?
A company needs to build a large Layer 3 WLAN to cover its office building. There are a large number of employees in the office building and they usually connect to the company WLAN at the entrance and then move to their own work locations. The company has deployed a...
Which roles belong to a Mesh network? (Multiple Choice)
Which roles belong to a Mesh network? (Multiple Choice)A . MPB . MPPC . MAPD . VAPView AnswerAnswer: ABC
Which of the following statements about the dual-link cold backup networking are TRUE? (Multiple Choice)
Which of the following statements about the dual-link cold backup networking are TRUE? (Multiple Choice)A . An AP sets up a CAPWAP tunnel only with the active AC . An AP sets up CAPWAP tunnels with both the active and standby ACs.D . An AP periodically exchanges CAPWAP packets with...
On a WLAN with the WIDS function enabled, which of the following devices will NOT trigger rogue device alarms after they are identified as rogue devices? (Multiple Choice)
On a WLAN with the WIDS function enabled, which of the following devices will NOT trigger rogue device alarms after they are identified as rogue devices? (Multiple Choice)A . APB . Ad-hocC . Wireless bridgeD . STAView AnswerAnswer: BCD
Which of the following is the correct procedure to configure rogue device countermeasure against an AP that forges SSID huawei?
On a WLAN network, AP group ap-group1 and WIDS profile wids1 are configured. Which of the following is the correct procedure to configure rogue device countermeasure against an AP that forges SSID huawei? A . ① > ② > ④B . ⑤ > ② > ③C . ① > ②...
Which of the following statements is FALSE about the AD and LDAP servers?
Which of the following statements is FALSE about the AD and LDAP servers?A . The AD server is a dedicated directory server for the Windows Server.B . LDAP can be installed on the Windows Server.C . The AD server uses the AD directory service protocol.D . The AD server uses...
What user identity authentication modes does the Agile Controller support? (Multiple Choice)
What user identity authentication modes does the Agile Controller support? (Multiple Choice)A . Authentication using a common accountB . Third-party authenticationC . Authentication using a digital certificateD . MAC address bypass authenticationView AnswerAnswer: ABC
On WLANs where many users exist, such as WLANs in high density scenarios, users compete fiercely to occupy channels as the number of online users increases. As a result, network quality deteriorates. To ensure network access experience of online users, Calling Access Control (CAC) can be configured. CAC allows an AP to control user access based on the CAC thresholds set according to the radio channel usage, number of online users on a radio, or terminal signal-to-noise ratio (SNR), ensuring network access quality of online users.
On WLANs where many users exist, such as WLANs in high density scenarios, users compete fiercely to occupy channels as the number of online users increases. As a result, network quality deteriorates. To ensure network access experience of online users, Calling Access Control (CAC) can be configured. CAC allows an...