Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H12-321 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H12-321_V1.0

H12-321 Exam Dumps - Huawei Certified Network Professional - Wireless Local Area Network- Constructing Enterprise WLAN Architecture

Question # 4

Which of the following servers is a directory server?

A.

Radius server

B.

AD server

C.

DNS server

D.

Portal server

Full Access
Question # 5

Which statements about fast roaming are TRUE? (Multiple Choice)

A.

If the encryption and authentication mode is not WPA2+dotlx, non-fast roaming is implemented.

B.

Re-authentication is not required after fast roaming, and the STA only needs to complete 4-way key negotiation.

C.

Re-authentication is not required after fast roaming, and the STA does not need to complete 4-way key negotiation.

D.

Fast roaming can be implemented for any STA so long as APs support fast roaming.

Full Access
Question # 6

Which of the following techniques are part of the way to implement STA fast roaming?

A.

PMK caching

B.

Key negotiation down

C.

Improve terminal roaming initiative

D.

Home agent is deployed on the AC

Full Access
Question # 7

After setting up tunnels with the active and standby ACs, the AP sends Echo messages to monitor tunnel status. The Echo messages contain the active/standby status of the tunnels. When the AP detects that the primary tunnel fails, it sends an Echo Request message with the active flag to the standby AC. After receiving the Echo Request message, the standby AC becomes the active AC, and the AP sends STA data to this AC.

A.

TRUE

B.

FALSE

Full Access
Question # 8

When the STA uses the WPA2-802.1x security policy and supports fast roaming, the STA only needs to perform key negotiation, but does not need to pass 802.lx authentication again during roaming.

A.

TRUE

B.

FALSE

Full Access
Question # 9

In the hot standby, the following statement about the HSB backup channel is wrong?

A.

The HSB backup channel between the primary and backup ACs is recommended to be connected separately to ensure high reliability.

B.

The HSB backup combination backup service is independent of each other, and the HSB backup group can work normally without binding.

C.

In the VRRP hot standby, the active/standby status of the HSB backup channel changes with the active/standby status of the VRRP.

D.

Under dual-link hot backup, the HSB channel has no active/standby status, only the data backup channel.

Full Access
Question # 10

Which command can display information about the AP groups in the specified Mesh profile and information about the AP specific profile.

A.

display references mesh-profile

B.

display references ap-system-profile

C.

display references wired-port-profile

D.

display references radio-5g-profile

Full Access
Question # 11

Which is the correct sequence for selecting a proper AP for 802.Ilk-capable STAs in smart roaming?

1. Determine whether latency-sensitive services exist.

2. Filter out APs that do not support load balancing.

3. Filter out APs that do not meet the CAC requirement.

4. Select the AP with the strongest signal strength as the target AP.

5. Select APs meeting the difference threshold conditions.

A.

1->2->3->4->5

B.

1->3->4->5->2

C.

1->5->3->2->4

D.

1->4->5->3->2

Full Access
Question # 12

In a WLAN network environment, after a Spoof spoofing attack, the attacking terminal cannot be determined by the MAC address.

A.

Correct

B.

False

Full Access
Question # 13

In the channel switching service uninterrupted feature, the time that the AP and the terminal agree to switch the channel synchronously is based on the beacon frame. The two parties agree to switch the channel synchronously after the time node of the certain beacon frame.

A.

Correct

B.

False

Full Access
Question # 14

Which of the following statements about 802.lx authentication methods are TRUE? (Multiple Choice)

A.

802.lx authentication methods include port-based authentication and MAC-based authentication.

B.

Port-based authentication and MAC-based authentication can be enabled simultaneously on the same interface.

C.

MAC-based authentication is more secure than port-based authentication.

D.

Port-based authentication is more secure than MAC-based authentication.

Full Access
Question # 15

What is the internal destruction method of the Mesh network?

A.

STP

B.

TTL

C.

Repeat frame number detection

D.

MSTP

Full Access
Question # 16

What device types can be defined based on security level on a WLAN? (Multiple Choice)

A.

Authorized device

B.

Rogue device

C.

Monitor device

D.

Interfering device

Full Access
Question # 17

In the WLAN network, which of the following will trigger an alarm?

A.

Flood attack

B.

Spoof attack

C.

Weak IV attack

D.

Violent cracking

Full Access
Question # 18

An engineer wants to use the Agile Controller as the Portal server and synchronize data from an external source. No exceptions occur in the synchronization, but Portal authentication frequently fails. What is the possible cause? (Multiple Choice)

A.

Portal authentication is disabled on the Agile Controller.

B.

Portal authentication is disabled for users on the Agile Controller.

C.

802.lx authentication is disabled on the Agile Controller.

D.

MAC address bypass authentication is enabled on the Agile Controller.

Full Access
Question # 19

Which statements about Layer 2 and Layer 3 roaming are TRUE? (Multiple Choice)

A.

After Layer 3 roaming is performed, the VLAN IDs in the service set of APs are changed.

B.

If the VLAN IDs before and after roaming are the same, the STA roams at Layer 2.

C.

Layer 2 roaming indicates that STAs roam within the same subnet.

D.

Layer 3 roaming indicates that STAs roam between different subnets.

Full Access
Question # 20

In a WLAN network that enables flood attack detection, the AP detects flooding attacks by detecting which of the following items.

A.

Number of access terminals of the AP

B.

The frequency of the uplink and the line of the terminal on the AP

C.

The number of times the terminal attempts to log in on the AP.

D.

Traffic size of the STA on the AP

Full Access
Question # 21

What is wrong about the description of the omnidirectional antenna below?

A.

Omnidirectional antenna distributes the signal evenly over a 360-degree omnidirectional area around the center point

B.

The omnidirectional antenna has a lobe width of 360 degrees horizontally

C.

The omnidirectional antenna has strong energy gathering ability and the direction of the signal is good.

D.

The omnidirectional antenna has a lobe width of 360 degrees vertically

Full Access
Question # 22

Which of the following statements about backup CAPWAP tunnel setup are TRUE? (Multiple Choice)

A.

The AP and ACs set up the primary and backup tunnels at the same time and complete configuration delivery.

B.

The AP sends a Discovery Request message to the standby AC in broadcast mode.

C.

The AP sends a Join Request message, notifying the standby AC that the configurations have been delivered.

D.

After receiving the Join Request message, the AC sets up a CAPWAP tunnel with the AP but does not deliver configurations to the AP.

Full Access
Question # 23

As shown in the figure, different companies on adjacent floors of an office building use multiple SSIDs. If a company enables WIDS rogue device countermeasure, APs of other companies will be affected. Which of the following functions can solve this problem?

A.

Dynamic blacklist

B.

WIDS countermeasure mode switching

C.

WIDS bogus SSID detection

D.

WIDS whitelist

Full Access
Question # 24

On a WLAN network, the following two types of packets are included in the Spoof spoofing attack packet?

A.

Broadcast type de-correlation frame Disassociation

B.

Broadcast-type deauthentication frame Deauthentication

C.

Unicast type de-correlation frame Disassociation

D.

Unicast type of deauthentication frame Deauthentication

Full Access
Question # 25

When using the Agile Controller to synchronize data, an engineer finds that information of the following users cannot be synchronized: Jack=boss/ Mike=leader/ Mary=manager, Ann=girlfriend. There are no duplicate user names in the related user groups or OUs. What may cause the synchronization failure?

A.

The user names are too long.

B.

The user names are too short.

C.

The user names contain invalid characters.

D.

The user names must contain digits and letters.

Full Access
Question # 26

Radar systems in some areas operate in the 5G band and interfere with AP RF signals operating in the 5G band. With the DFS function, when the AP detects that there is interference in the frequency band of its working channel, engineers need to manually switch the working channel.

A.

Correct

B.

False

Full Access
Question # 27

The Agile Controller supports multiple authentication methods in wireless access authentication. Which of the following statements is FALSE?

A.

The Agile Controller does not support MAC address bypass authentication.

B.

The Agile Controller supports 802.lx authentication.

C.

The Agile Controller supports Portal authentication.

D.

Multiple authentication methods can be used to authenticate users.

Full Access
Question # 28

As shown in the following figure, the data traffic before roaming is forwarded to the STA-HAP-HAC-upper layer network. The forwarding mode is direct forwarding. The home agent is configured on the AC. After the three-layer roaming, the data forwarding traffic is forwarded.

A.

STA-FAP-FAC-upper layer network

B.

STA-FAP-FAC-HAC-FAC-upper layer network

C.

STA-FAP-FAC-HAC-upper layer network

D.

STA-FAP-FAC-HAC-HAP-HAC-upper layer network

Full Access
Question # 29

According to different scenarios, the Layer 3 roaming of the direct forwarding network can set the AC or AP as the home agent. When the AP is set as the home agent, tunnel forwarding needs to be established between the APs before and after roaming.

A.

Correct

B.

False

Full Access
Question # 30

When dual-link HSB is configured, an AP sets up CAPWAP links with both the active and standby ACs.

A.

TRUE

B.

FALSE

Full Access
Question # 31

Which are the omnidirectional antenna patterns? (Multiple Choice)

A.

(a)

B.

(b)

C.

(c)

D.

(d)

Full Access
Question # 32

Which of the following statements about NAC is FALSE?

A.

NAC stands for Network Admission Control.

B.

NAC is an end-to-end security framework, covering 802.lx authentication, MAC address authentication, and Portal authentication.

C.

In a NAC system, access terminals need to install client software if Portal authentication is used.

D.

In a NAC system, access terminals need to install client software if 802.lx authentication is used.

Full Access
Question # 33

Regarding the NAC statement, what is wrong with the following description?

A.

NAC (Network Admission Control) is called network admission control.

B.

NAC is an end-to-end security architecture that includes 802.1x, MAC and Portal authentication.

C.

NAC access terminal equipment, if you need Portal authentication, you need to install client software.

D.

NAC access terminals use 802.1x authentication, you need to install client software.

Full Access
Question # 34

Globally, the AC runs the () and () algorithms based on the neighbor relationship, interference, and load information to generate the new transmit power and working channel of the AP.

A.

EDCA

B.

DCA

C.

CAC

D.

TPC

Full Access
Question # 35

The AP detects whether the number of key negotiation failures of the key negotiation packets in the WPA/WPA2 PSK, WAPI-PSK, and WEP-Share-Key authentication exceeds the configured threshold to detect whether it is brute-forced.

A.

Correct

B.

False

Full Access
Question # 36

When the VRRP hot backup is configured, the active and standby ACs can be hot standby through Layer 3 interworking on two different Layer 2 networks.

A.

Correct

B.

False

Full Access
Question # 37

A company needs to set up a large WLAN network. The current number of employees in the company is large, the amount of business data is large, and there may be a need for WLAN expansion in the later stage. Is the following statement correct?

A.

ACU2 can be selected as the AC for networking.

B.

You can configure VLAN Pool

C.

To ensure wireless network security, you can configure a high security security policy.

D.

AC6005 can be used as the AC for networking.

Full Access
Question # 38

In the N+1 backup networking shown in the figure, 300 APs (API to AP300) go online on AC1 and 400 APs (AP301 to AP700) go online on AC2. AC3 is the standby AC and a maximum of 700 online APs can be configured on AC3. However, AC3 allows a maximum of 500 APs to go online concurrently. Which of the following statements are FALSE when the configuration remains unchanged? (Multiple Choice)

A.

If AC1 fails, 300 APs (API to AP300) perform an active/standby switchover and go online on AC3.

B.

If AC2 fails, 400 APs (AP301 to AP700) perform an active/standby switchover and go online on AC3.

C.

If AC1 and AC2 fail concurrently, only 500 APs (API to AP500) perform an active/standby

switchover and go online on AC3. The rest 200 APs cannot go online on AC3 and services on these APs are interrupted.

D.

After the faulty AC1 or AC2 recovers, APs that perform a revertive switchover and go online on AC1 or AC2 are uncertain.

Full Access
Question # 39

In the WLAN network with WIDS enabled, which of the following statements about device information is wrong?

A.

Device information reporting, short-term reporting, also known as instant reporting cycle

B.

The long period of device information reporting can be set, the minimum is 1 hour.

C.

Short-term reporting is full reporting

D.

The default time for long-term reporting is 5 hours.

Full Access
Question # 40

Improper processing of which of the following packets will lead to packet congestion? (Multiple Choice)

A.

Unknown unicast packets

B.

Broadcast packets

C.

Multicast packets

D.

Anycast

Full Access
Question # 41

In the figure, where STP needs to be enabled?

A.

AC GO/0/1

B.

MPP

C.

MP

D.

Switch

Full Access
Question # 42

What information does an authorized AP need to collect and report to the AC during passive neighbor probe? (Multiple Choice)

A.

Interference between APs

B.

Interference from rogue APs

C.

Interference from non-Wi-Fi devices

D.

Infrared ray interference

Full Access
Question # 43

Which of the following terminal accesses is best for MAC authentication?

A.

Office running PC running Windows

B.

Testing the PC running Linux system

C.

Mobile clients for daily use, such as smartphones, etc.

D.

Network printer

Full Access
Question # 44

In the same-frequency mesh network, the transmission bandwidth of two APs is about 200M. What is the average transmission bandwidth when an AP is added?

A.

Up to 200M

B.

Up to 150M

C.

Up to 100M

D.

Up to 50M

Full Access
Question # 45

On a WLAN with the WIDS function enabled, APs with the following MAC addresses are detected:

01-01-22-22-33-33

02-01-01-22-33-33

02-01-01-22-33-34

02-01-22-01-01-22

OUI 01-01-22 has been added to the whitelist. Which of these APs will be identified as rogue APs?

(Multiple Choice)

A.

01-01-22-22-33-33

B.

02-01-01-22-33-33

C.

02-01-01-22-33-34

D.

02-01-22-01-01-22

Full Access
Question # 46

Which of the following is the WLAN security threat?

A.

Weak IV attacks

B.

WDS

C.

WIDS

D.

WIPS

Full Access
Question # 47

During global radio calibration the AC runs ( ) and ( ) algorithms according to the AP neighbor relationship, interference, and load information to generate new transmit power and working channels and delivers them to APs. (Multiple Choice)

A.

EDCA

B.

DCA

C.

CAC

D.

TPC

Full Access
Question # 48

Which of the following statements about the N+l backup networking shown in the figure are

TRUE? (Multiple Choice)

A.

Standby AC3 must be on the same Layer 2 network as active AC1 and active AC2.

B.

Basic WLAN service configurations on standby AC3 must be the same as those on active AC1 and active AC2 to ensure that APs can obtain the correct configuration after an active/standby switchover of AGs.

C.

AP-specific priorities can be configured on active and standby ACs respectively so that APs can select the corresponding active AC based on the priority configurations on ACs.

D.

Corresponding MAC address whitelists can be configured on active ACs to ensure that APs select the correct active AC and go online on the AC.

Full Access
Question # 49

Which of the following statements about rogue devices are TRUE? (Multiple Choice)

A.

A rogue AP is an AP not managed by the local AC.

B.

A rogue STA is a STA that does not go online through the local AC.

C.

A rogue bridge is a WDS device not managed by the local AC.

D.

All ad-hoc devices are rogue devices.

Full Access
Question # 50

On a WLAN network, AP group ap-group1 and WIDS profile wids1 are configured. Which of the following is the correct procedure to configure rogue device countermeasure against an AP that forges SSID huawei?

A.

® > © > ©

B.

© > © > ®

C.

® > © > ®

D.

© > © > ©

Full Access
Question # 51

Which of the following statements are TRUE about load balancing modes provided by the HSB solution?

(Multiple Choice)

A.

VRRP HSB can apply to the load balancing mode.

B.

In dual-link HSB mode, the link to the active device is the active link and the link to the standby AC is the standby link.

C.

An HSB service backs up information from the active device to the standby device.

D.

Dual-link backup can apply to the load balancing mode.

Full Access
Question # 52

On a large WLAN network, you can set the DSCP priority of CAPWAP management packets to high priority to improve the reliability of the CAPWAP link between the AP and the AC.

A.

Correct

B.

False

Full Access
Question # 53

As shown in the figure, which AP and STA in the figure cannot perform normal data communication?

A.

AP1 and STA1

B.

AP1 and STA2

C.

AP2 and STA1

D.

AP2 and STA2

Full Access
Question # 54

Which statement about the omnidirectional antenna is FALSE?

A.

Signals from an omnidirectional antenna are evenly distributed 360 degrees around the central point.

B.

The lobe width of an omnidirectional antenna is horizontal 360 degrees.

C.

The omnidirectional antenna can concentrate energy and transmit signals to a specified direction.

D.

The lobe width of an omnidirectional antenna is vertical 360 degrees.

Full Access
Question # 55

As shown in the figure, what is the correct label for the Fresnel area?

A.

a

B.

b

C.

c

D.

d

Full Access
Question # 56

Multiple AD directory servers are used as external source on a large-scale network. Some user information fails to be synchronized to the Agile Controller. What is the possible cause of the failure? (Multiple Choice)

A.

There are duplicate OU names on the AD directory servers, and OU-based synchronization is used.

B.

Some user information is manually created on the Agile Controller.

C.

There are no duplicate OU names or user group names on the AD directory servers, but different synchronization types are used to synchronize user information from different AD directory servers.

D.

The parameter configuration between the Agile Controller and an AD directory server is incorrect.

Full Access
Question # 57

From the roaming process, which of the following processes does roaming need to go through?

A.

Roaming measurement

B.

Roaming recognition

C.

Roaming decision

D.

Roaming execution

Full Access
Question # 58

Which is NOT Mesh networking?

A.

(a)

B.

(b)

C.

(c)

D.

(d)

Full Access
Question # 59

According to probe results reported by an AP, an AC can obtain neighbor relationships between the AP and surrounding devices (including authorized APs, rogue APs, and non-Wi-Fi devices), as shown in the following figure. To avoid reported data getting oversized, only data from authorized APs whose signal strength is greater than -85 dBm and rogue APs whose signal strength is greater than ( ) dBm is reported.

A.

75

B.

80

C.

85

D.

90

Full Access
Question # 60

In long-distance point-to-point communication over WLAN, if a stable communication link is to be maintained, what percentage of the first Fresnel area can't be blocked?

A.

0.2

B.

0.4

C.

0.5

D.

0.6

Full Access
Question # 61

Engineers of a large enterprise configure the VLAN Pool function when deploying the WLAN. Which of the following options may be the reasons for configuring the function? (Multiple Choice)

A.

There are a large number of IP address requests in some areas.

B.

Users request to obtain fixed IP addresses.

C.

To reduce the broadcast domain to limit the number of broadcast packets, thereby to improve the network performance.

D.

Break the limit that one SSID can only correspond to one VLAN.

Full Access
Question # 62

A large enterprise deploys a WLAN network, and some SSIDs use direct forwarding. The following description of the direct forwarding mode is correct?

A.

Business data does not need to be moved back to the AC, there is no forwarding bottleneck

B.

Convenient centralized control of wireless traffic, with obvious advantages in user policy control, wireless roaming, etc.

C.

Security is better when forwarding data packets

D.

AC expansion is simple, increase the number of independent ACs

Full Access
Question # 63

For a small-scale enterprise, which of the following WIDS/WIPS functions is recommended for WLAN security guarantee?

A.

Rogue device detection

B.

Rogue device countermeasure

C.

WIDS attack detection

D.

Blacklist and whitelist

Full Access
Question # 64

What is the correct description of the second Fresnel zone below?

A.

Out of phase with point source

B.

In phase with the point source

C.

Less than the first Fresnel zone

D.

Greater than the first Fresnel zone

Full Access
Question # 65

Which statement about identification of sticky STA is TRUE?

A.

The detection results in three consecutive detection intervals are smaller than the specified roaming threshold.

B.

The detection results in three consecutive detection intervals are greater than the specified roaming threshold.

C.

The detection results in six consecutive detection intervals are smaller than the specified roaming threshold.

D.

The detection results in six consecutive detection intervals are greater than the specified roaming threshold.

Full Access
Question # 66

In a data frame, which values of the To DS and From DS fields identify the device type as AP?

A.

0, 0

B.

0,1

C.

1,0

D.

1, 1

Full Access
Question # 67

When a WLAN network is set up in an enterprise, when the WLAN network is configured, the order of the following steps is correct according to the order of general configuration. 1. Adding an AP to the line 2. Configuring a security profile, SSID profile, and VAP profile 3. Configuring the source interface 4, creating an AP group 5, connecting the STA to the line, and verifying the configuration result 6. The AP group references the security profile, the SSID profile, and the VAP profile. Configure country code

A.

4->1->3->7->2->6->5

B.

7->1->3->4->2->6->5

C.

7->4->3->1->2->6->5

D.

4->3->1->7->2->6->5

Full Access
Question # 68

An engineer sets the synchronization type of the Agile Controller to be synchronized by group. However, after synchronization, there is no information on the Controller. Check the AD directory server and find that the directory server is normal. User information and user group information are normal. What is the possible cause of this phenomenon?

A.

The synchronization mode of the Agile Controller is configured to automatically synchronize.

B.

Agile Controller synchronization range configuration error

C.

The data structure mapping configuration of the Agile Controller authentication source is incorrect.

D.

The Agile Controller does not have any OU filters configured.

Full Access
Question # 69

Which of the following statements about the three backup modes are TRUE? (Multiple Choice)

A.

Dual-link HSB: backs up AP, STA, and CAPWAP link information.

B.

VRRP HSB: backs up AP, STA, and CAPWAP link information.

C.

No matter in hot standby or cold standby mode, a standby AC can provide backup services for only one active AC.

D.

Dual-link backup is a cold backup mode, which does not back up STA information. An AP sets up a link with both the active and standby ACs. During an active/standby switchover or a revertive switchover, STAs need to go online again and services are temporarily interrupted.

Full Access
Question # 70

Which two types of spoofing attack packets are there on a WLAN? (Multiple Choice)

A.

Broadcast Disassociation frame

B.

Broadcast Deauthentication frame

C.

Unicast Disassociation frame

D.

Unicast Deauthentication frame

Full Access
Question # 71

Which routing protocols are supported by HWMP? (Multiple Choice)

A.

pro-active

B.

OSPF

C.

on-demand

D.

iIGRP

Full Access
Question # 72

An enterprise needs to upgrade the AC. Which of the following methods is used to upload the upgrade file to the AC?

A.

AC as the SFTP Client

B.

AC as SFTP Server

C.

AC as an FTP Client

D.

AC as FTP Server

Full Access
Question # 73

To quickly obtain information about the AC from which an STA goes online, the online status of al ACs in the roaming group and STAs must be saved on each AC.

A.

TRUE

B.

FALSE

Full Access
Question # 74

What is the correct configuration for referencing a wired interface template?

A.

[AC-wlan-view] ap-group name mesh-mpp [AC-wlan-ap-group-mesh-mpp] mesh-profile mesh-net radio 1

B.

[AC-wlan-view] ap-group name mesh-mpp [AC-wlan-ap-group-mesh-mpp] regulatory-domain-profile domain 1

C.

[AC-wlan-view] ap-group name mesh-mpp [AC-wlan-ap-group-mesh-mpp] wired-port-profile wired-port gigabithernet 0

D.

[AC-wlan-view] ap-group name mesh-mpp [AC-wlan-ap-group-mesh-mpp] ap-system-profile mesh-sys

Full Access
Question # 75

A large enterprise needs to deploy a WLAN and has deployed Huawei chassis switches (S7700/9700/12700) on the live network. To save equipment room space and facilitate network capacity expansion in the future, the customer can install AC cards on chassis switches to deploy the WLAN.

Which types of ACs can be installed on chassis switches?

(Multiple Choice)

A.

ACU2

B.

AC6605

C.

AC6005

D.

X1E card

Full Access
Question # 76

In the WLAN network environment where the WIDS function is enabled, the detected AP device MAC addresses include: 01-01-22-22-33-33 02-01-01-22-33-33 02-01-01-22-33 -34 02-01-22-01-01-22 The configured oui white list is 01-01-22; Which of the above is an illegal AP?

A.

01-01-22-22-33-33

B.

02-01-01-22-33-33

C.

02-01-01-22-33-34

D.

02-01-22-01-01-22

Full Access
Question # 77

What is the protection time for blind handover in smart roaming?

A.

20 minutes

B.

30 minutes

C.

60 minutes

D.

15 minutes

Full Access
Question # 78

According to the detection result reported by the AP, the AC can obtain the neighbor relationship between the AP and the neighboring devices, and the neighbor relationships of all the radio devices (including the legal AP, the rogue AP, and the non-Wi-Fi interference device) in the entire AC, as shown in the following figure: The reported data is too large. Only the legal neighbors whose signal strength is greater than -85dBm and the illegal neighbors whose signal strength is greater than ()dBm are reported here?

A.

-75

B.

-80

C.

-85

D.

-90

Full Access
Question # 79

On a WLAN that uses the AC6005 as the RADIUS client, which of the following statements is TRUE about the authentication-free rule profile?

A.

The authentication-free rule profile is used to permit the IP addresses of anti-virus devices such as the anti-virus gateway and firewall.

B.

The authentication-free rule profile is used to permit the IP addresses of the DNS, DHCP, and authentication servers.

C.

The authentication-free rule profile can use advanced ACLs.

D.

The authentication-free rule profile can permit specified IP addresses only by using ACLs.

Full Access
Question # 80

As shown in the figure, in order to prevent the STP packets from being transparently transmitted, the loops affect each other. The following does not need to enable the STP spanning tree protocol?

A.

Only the MPP wired side interface needs to enable STP.

B.

Only the MP3 wired side interface needs to enable STP.

C.

MPP and MP3 wired side interfaces must be enabled with STP.

D.

MP1 and MP2 need to enable STP

Full Access