The Mesh network supports AP zero-configuration online, that is, the AP does not need to do any configuration on the AP and AC before going online, and the AP can go online after ensuring that the AP and AC network is reachable.

The Mesh network supports AP zero-configuration online, that is, the AP does not need to do any configuration on the AP and AC before going online, and the AP can go online after ensuring that the AP and AC network is reachable. A . True B. FalseView AnswerAnswer: B

July 11, 2023 No Comments READ MORE +

Which of the following commands about creating a static load balancing group is correct?

Which of the following commands about creating a static load balancing group is correct?A . [AC-wlan-view] regulatory-domain-profile name domain1 B. [AC-wlan-view] air-scan-profile name wlan-airscan C. [AC-wlan-view] rrm-profile name profile-name D. [AC-wlan-view] sta-load-balance static-group name static-1View AnswerAnswer: D

July 10, 2023 No Comments READ MORE +

In the N+1 backup or dual-link cold backup networking scenario, configuring the CAPWAP heartbeat detection interval and times to be smaller can effectively improve the service interruption time when the main link is abnormal, and does not affect the reliability of the CAPWAP link.

In the N+1 backup or dual-link cold backup networking scenario, configuring the CAPWAP heartbeat detection interval and times to be smaller can effectively improve the service interruption time when the main link is abnormal, and does not affect the reliability of the CAPWAP link.A . True B. FalseView AnswerAnswer: B

July 10, 2023 No Comments READ MORE +

The two IPs that implement WLAN roaming must use the same SSID and security template (the name of the security template can be different, but the configuration under the security template must be the same), and the authentication mode and authentication parameters of the authentication board must also be configured the same.

The two IPs that implement WLAN roaming must use the same SSID and security template (the name of the security template can be different, but the configuration under the security template must be the same), and the authentication mode and authentication parameters of the authentication board must also be configured...

July 9, 2023 No Comments READ MORE +

In a WLAN project, when the engineer was upgrading the AC, the AC system was damaged due to an unexpected power failure. At this time, which of the following methods can be used to re-upgrade the AC?

In a WLAN project, when the engineer was upgrading the AC, the AC system was damaged due to an unexpected power failure. At this time, which of the following methods can be used to re-upgrade the AC?A . Command line upgrade B. Web network management upgrade C. Boot upgrade D....

July 8, 2023 No Comments READ MORE +

Four APs are deployed in a conference room that can accommodate up to 100 people. By configuring the CAC function on each AP, the number of users of a single AP cannot exceed 25, and the SSID will be hidden after exceeding. Thus, the effect of load balancing among APs is indirectly realized.

Four APs are deployed in a conference room that can accommodate up to 100 people. By configuring the CAC function on each AP, the number of users of a single AP cannot exceed 25, and the SSID will be hidden after exceeding. Thus, the effect of load balancing among APs...

July 8, 2023 No Comments READ MORE +

Which of the following commands can check whether the automatic selection function of the AP channel and transmit power is enabled?

Which of the following commands can check whether the automatic selection function of the AP channel and transmit power is enabled?A . [AC-wlan-view] display station ssid wlan-net B. [AC-wlan-view] display rrm-profile name profile-name C. [AC-wlan-view] display radio all D. [AC-wlan-view] display yap-profile name profile-nameView AnswerAnswer: B

July 8, 2023 No Comments READ MORE +

As shown in the figure, the WIDS attack detection process is shown. After the dynamic blacklist is issued, how will the AP handle different data traffic during the blacklist penalty period?

As shown in the figure, the WIDS attack detection process is shown. After the dynamic blacklist is issued, how will the AP handle different data traffic during the blacklist penalty period? A . Forward normal data traffic and drop attack traffic B. Discard normal data traffic and report attack traffic...

July 8, 2023 No Comments READ MORE +

The lobe width is a very important parameter commonly used in directional antennas. It refers to the width of the angle formed by the radiation pattern of the antenna below the peak () dB.

The lobe width is a very important parameter commonly used in directional antennas. It refers to the width of the angle formed by the radiation pattern of the antenna below the peak () dB.A . 3 B.4 C.5 D.6View AnswerAnswer: A

July 7, 2023 No Comments READ MORE +