The illegal device prevention function refers to the configuration of the blacklist function based on illegal devices to restrict AP or Client access.
The illegal device prevention function refers to the configuration of the blacklist function based on illegal devices to restrict AP or Client access.A . TrueB . FalseView AnswerAnswer: A
Which of the following commands is not necessary to configure the Mesh whitelist?
Which of the following commands is not necessary to configure the Mesh whitelist?A . radio radio-idB . ap-system-profileC . mesh-whitelist-profileD . peer-ap macView AnswerAnswer: B
Regarding the precautions for configuring HSB main and backup services, which of the following statements is wrong?
Regarding the precautions for configuring HSB main and backup services, which of the following statements is wrong?A . If you want to modify, you need to delete the HSB active and standby services first, and then reconfigureB . Only after enabling the dual-system hot backup function, the configured HSB active/standby...
In WLAN smart roaming, what is the mechanism time for blind user protection?
In WLAN smart roaming, what is the mechanism time for blind user protection?A . 20 minutesB . 30 minutesC . 60 minutesD . 15 minutesView AnswerAnswer: B
Regarding the dual-link hot standby configuration, when configuring the priority of an AC, the larger the priority value, the higher the actual priority of the AC.
Regarding the dual-link hot standby configuration, when configuring the priority of an AC, the larger the priority value, the higher the actual priority of the AC.A . TrueB . FalseView AnswerAnswer: B
The following is the URL template configuration when configuring the AC6005 to connect to the Portal server. Which of the following statement is error?
The following is the URL template configuration when configuring the AC6005 to connect to the Portal server. Which of the following statement is error?A . The port number 8080 can be changed to 8443B . Portal can be changed to webauthC . url-parameter ssid ssid means SSID=ssidD . url-parameter ssid...
If a small conference room with a maximum of 90 people is equipped with 3 APs, by configuring CAC on each AP, the number of users cannot exceed 30, and the SSID will be hidden after exceeding, which can indirectly achieve the effect of load balancing among APs.
If a small conference room with a maximum of 90 people is equipped with 3 APs, by configuring CAC on each AP, the number of users cannot exceed 30, and the SSID will be hidden after exceeding, which can indirectly achieve the effect of load balancing among APs.A . TrueB...
In the WLAN network, the Weak IV attack detection function does not require the support of the dynamic blacklist function.
In the WLAN network, the Weak IV attack detection function does not require the support of the dynamic blacklist function.A . TrueB . FalseView AnswerAnswer: A
In the WLAN outdoor long-distance point-to-point communication, if a stable communication link is to be maintained, what percentage of the first Fresnel area generally cannot be blocked?
In the WLAN outdoor long-distance point-to-point communication, if a stable communication link is to be maintained, what percentage of the first Fresnel area generally cannot be blocked?A . 0.2B . 0.4C . 0.5D . 0.6View AnswerAnswer: B
Which of the following commands can be used to create an RF tuning template?
Which of the following commands can be used to create an RF tuning template?A . [AC-wlan-view] rrm-profile name wlan-netB . [AC-wlan-view] regulatory-domain-profile name domain1C . [AC-wlan-view] wired-port-profile name wired-portD . [AC-wlan-view] ap-system-profile name mesh-sysView AnswerAnswer: A