When the STA uses the WPA2-802.1x security policy and supports fast roaming, the STA only needs to perform key negotiation, but does not need to pass 802.1x authentication again during roaming.
When the STA uses the WPA2-802.1x security policy and supports fast roaming, the STA only needs to perform key negotiation, but does not need to pass 802.1x authentication again during roaming.A . TRUEB . FALSEView AnswerAnswer: A
Which of the following options may be the reasons for configuring the function?
Engineers of a large enterprise configure the VLAN Pool function when deploying the WLAN. Which of the following options may be the reasons for configuring the function? (Multiple Choice)A . There are a large number of IP address requests in some areas.B . Users request to obtain fixed IP addresses.C...
Devices must be added to different groups on the Agile Controller to facilitate rule delivery.
Devices must be added to different groups on the Agile Controller to facilitate rule delivery.A . TRUEB . FALSEView AnswerAnswer: B
The zone surrounding the line of sight (LOS) is called the Fresnel zone, which is also called the RF LOS.
The zone surrounding the line of sight (LOS) is called the Fresnel zone, which is also called the RF LOS.A . TRUEB . FALSEView AnswerAnswer: A
Which of the following are the possible time points will an active/standby switchover occur under normal circumstances after the primary CAPWAP tunnel between AP1 and AC1 is disconnected?
In the dual-link cold standby load balancing networking shown in the figure, AP1 has gone online and set up the primary CAPWAP tunnel with AC1. Which of the following are the possible time points will an active/standby switchover occur under normal circumstances after the primary CAPWAP tunnel between AP1 and...
Which of the following statements about HSB channels in HSB mode is FALSE?
Which of the following statements about HSB channels in HSB mode is FALSE?A . It is recommended that an HSB channel between the active and standby ACs be connected through one cable to ensure high reliability.B . An HSB group is independent from backup services. An HSB group can work...
On a WLAN that uses the Agile Controller as the admission control server, which of the following is NOT the cause of 802.1x authentication failures?
On a WLAN that uses the Agile Controller as the admission control server, which of the following is NOT the cause of 802.1x authentication failures?A . The key used by the Agile Controller to connect to the device is different from the key configured on the device.B . The accounting...
If three APs are deployed in a small conference room which can accommodate a maximum of 90 people, CAC can be configured on each AP to limit the number of associated STAs within 30 and hide its SSID when the number of associated STAs exceeds 30.
If three APs are deployed in a small conference room which can accommodate a maximum of 90 people, CAC can be configured on each AP to limit the number of associated STAs within 30 and hide its SSID when the number of associated STAs exceeds 30. In this way, load...
Which are the methods to prevent loops on a Mesh network? (Multiple Choice)
Which are the methods to prevent loops on a Mesh network? (Multiple Choice)A . STPB . TTLC . Repeated frame sequence number checkD . MSTPView AnswerAnswer: BC
Which role does the Agile Controller serve in wireless access authentication?
Which role does the Agile Controller serve in wireless access authentication?A . AD serverB . LDAP serverC . RADIUS serverD . DNS serverView AnswerAnswer: C