Taking 5GHz as an example, if the transmitting and receiving antennas are 1km apart, the radius of the Fresnel area is approximately?
Taking 5GHz as an example, if the transmitting and receiving antennas are 1km apart, the radius of the Fresnel area is approximately?A . 2.4m B. 3.6m C. 5.6m D. 6.2mView AnswerAnswer: B
Which of the following statements about the role of Mesh is correct?
Which of the following statements about the role of Mesh is correct?A . Mesh roles are based on radio configurations B. Mesh role based on AP configuration C. Mesh role based on VAP configuration D. Mesh roles can be configured based on arbitrary granularityView AnswerAnswer: B
Both N+1 backup and dual-link cold backup support the link switchback function. In order to avoid frequent switching caused by network shocks, N+1 backup and dual-link cold backup wait for 20 heartbeat cycles by default. Master/standby switchover operation.
Both N+1 backup and dual-link cold backup support the link switchback function. In order to avoid frequent switching caused by network shocks, N+1 backup and dual-link cold backup wait for 20 heartbeat cycles by default. Master/standby switchover operation.A . True B. FalseView AnswerAnswer: A
Regarding the definition of WIPS/WIDS, which of the following statements is correct?
Regarding the definition of WIPS/WIDS, which of the following statements is correct?A . WIDS is Wireless Intrusion Prevention System B. WIPS is Wireless Intrusion Detection System C. WIDS is Wireless Intrusion Countermeasure System D. WIPS is Wireless Intrusion Prevention SystemView AnswerAnswer: D
Which of the following commands can check whether the automatic selection function of the AP channel and transmit power is enabled?
Which of the following commands can check whether the automatic selection function of the AP channel and transmit power is enabled?A . [AC-wlan-view] display station ssid wlan-net B. [AC-wlan-view] display rrm-profile name profile-name C. [AC-wlan-view] display radio all D. [AC-wlan-view] display yap-profile name profile-nameView AnswerAnswer: B
According to the process of establishing a Mesh connection, which of the following steps is correct?
According to the process of establishing a Mesh connection, which of the following steps is correct? A . 4-3-2-1 B. 4-2-3-1 C. 2-3-4-1 D. 2-4-3-1View AnswerAnswer: B
The lobe width is a very important parameter commonly used in directional antennas. It refers to the width of the angle formed by the radiation pattern of the antenna below the peak () dB.
The lobe width is a very important parameter commonly used in directional antennas. It refers to the width of the angle formed by the radiation pattern of the antenna below the peak () dB.A . 3 B.4 C.5 D.6View AnswerAnswer: A
In the uninterrupted feature of channel switching, the mechanism of notifying the terminal to switch channels is defined by the 802.11h protocol.
In the uninterrupted feature of channel switching, the mechanism of notifying the terminal to switch channels is defined by the 802.11h protocol.A . True B. FalseView AnswerAnswer: A
Which of the following descriptions about directional antennas is wrong?
Which of the following descriptions about directional antennas is wrong?A . Directional antennas are radiated in a certain angle range on the horizontal pattern, which is commonly referred to as directional antennas. B. The directional antenna has the strongest energy gathering ability, and the direction of the signal is excellent...
The two IPs that implement WLAN roaming must use the same SSID and security template (the name of the security template can be different, but the configuration under the security template must be the same), and the authentication mode and authentication parameters of the authentication board must also be configured the same.
The two IPs that implement WLAN roaming must use the same SSID and security template (the name of the security template can be different, but the configuration under the security template must be the same), and the authentication mode and authentication parameters of the authentication board must also be configured...