When the STA uses the WPA2-802.1x security policy and supports fast roaming, the STA only needs to perform key negotiation, but does not need to pass 802.1x authentication again during roaming.

When the STA uses the WPA2-802.1x security policy and supports fast roaming, the STA only needs to perform key negotiation, but does not need to pass 802.1x authentication again during roaming.A . TRUEB . FALSEView AnswerAnswer: A

October 30, 2018 No Comments READ MORE +

Which of the following options may be the reasons for configuring the function?

Engineers of a large enterprise configure the VLAN Pool function when deploying the WLAN. Which of the following options may be the reasons for configuring the function? (Multiple Choice)A . There are a large number of IP address requests in some areas.B . Users request to obtain fixed IP addresses.C...

October 23, 2018 No Comments READ MORE +

Devices must be added to different groups on the Agile Controller to facilitate rule delivery.

Devices must be added to different groups on the Agile Controller to facilitate rule delivery.A . TRUEB . FALSEView AnswerAnswer: B

October 20, 2018 No Comments READ MORE +

The zone surrounding the line of sight (LOS) is called the Fresnel zone, which is also called the RF LOS.

The zone surrounding the line of sight (LOS) is called the Fresnel zone, which is also called the RF LOS.A . TRUEB . FALSEView AnswerAnswer: A

October 17, 2018 No Comments READ MORE +

Which of the following are the possible time points will an active/standby switchover occur under normal circumstances after the primary CAPWAP tunnel between AP1 and AC1 is disconnected?

In the dual-link cold standby load balancing networking shown in the figure, AP1 has gone online and set up the primary CAPWAP tunnel with AC1. Which of the following are the possible time points will an active/standby switchover occur under normal circumstances after the primary CAPWAP tunnel between AP1 and...

October 15, 2018 No Comments READ MORE +

Which of the following statements about HSB channels in HSB mode is FALSE?

Which of the following statements about HSB channels in HSB mode is FALSE?A . It is recommended that an HSB channel between the active and standby ACs be connected through one cable to ensure high reliability.B . An HSB group is independent from backup services. An HSB group can work...

October 13, 2018 No Comments READ MORE +

On a WLAN that uses the Agile Controller as the admission control server, which of the following is NOT the cause of 802.1x authentication failures?

On a WLAN that uses the Agile Controller as the admission control server, which of the following is NOT the cause of 802.1x authentication failures?A . The key used by the Agile Controller to connect to the device is different from the key configured on the device.B . The accounting...

September 26, 2018 No Comments READ MORE +

If three APs are deployed in a small conference room which can accommodate a maximum of 90 people, CAC can be configured on each AP to limit the number of associated STAs within 30 and hide its SSID when the number of associated STAs exceeds 30.

If three APs are deployed in a small conference room which can accommodate a maximum of 90 people, CAC can be configured on each AP to limit the number of associated STAs within 30 and hide its SSID when the number of associated STAs exceeds 30. In this way, load...

September 21, 2018 No Comments READ MORE +

Which are the methods to prevent loops on a Mesh network? (Multiple Choice)

Which are the methods to prevent loops on a Mesh network? (Multiple Choice)A . STPB . TTLC . Repeated frame sequence number checkD . MSTPView AnswerAnswer: BC

September 21, 2018 No Comments READ MORE +

Which role does the Agile Controller serve in wireless access authentication?

Which role does the Agile Controller serve in wireless access authentication?A . AD serverB . LDAP serverC . RADIUS serverD . DNS serverView AnswerAnswer: C

September 10, 2018 No Comments READ MORE +