AC6005 enables the flood attack detection function. By default, what is the flood attack detection cycle and the maximum number of similar packets?

AC6005 enables the flood attack detection function. By default, what is the flood attack detection cycle and the maximum number of similar packets?A . 30s, 100B . 45s, 150C . 60s, 300D . 90s, 400View AnswerAnswer: C

December 3, 2021 No Comments READ MORE +

The following is the configuration when configuring the AC6005 to connect to the Portal server. What port does port 50200 refer to?

The following is the configuration when configuring the AC6005 to connect to the Portal server. What port does port 50200 refer to? Web-auth-server huawei Server-ip 10.254.1.100 Port 50200 Shared-key ciper huawei url-template huaweiA . The destination port number used when actively sending messages to the Portal serverB . Port number...

December 3, 2021 No Comments READ MORE +

As shown in the figure is the WIDS attack detection process. After the dynamic blacklist is issued, how will the AP handle different data traffic when it is in the blacklist penalty period?

As shown in the figure is the WIDS attack detection process. After the dynamic blacklist is issued, how will the AP handle different data traffic when it is in the blacklist penalty period? A . Forward normal data traffic and discard attack trafficB . Discard normal data traffic and report...

December 3, 2021 No Comments READ MORE +

As shown in the figure, in order to avoid the transparent transmission of STP packets and cause loops to affect each other, which of the following does not need to enable the STP spanning tree protocol?

As shown in the figure, in order to avoid the transparent transmission of STP packets and cause loops to affect each other, which of the following does not need to enable the STP spanning tree protocol? A . Only the MPP wired side interface needs to enable the STP functionB...

December 3, 2021 No Comments READ MORE +

Which of the following commands can be used to create an RF tuning template?

Which of the following commands can be used to create an RF tuning template?A . [AC-wlan-view] rrm-profile name wlan-netB . [AC-wlan-view] regulatory-domain-profile name domain1C . [AC-wlan-view] wired-port-profile name wired-portD . [AC-wlan-view] ap-system-profile name mesh-sysView AnswerAnswer: A

December 3, 2021 No Comments READ MORE +

Configure the country code

Configure the country codeA . 4 → 1 → 3 → 7 → 2 → 6 → 5B . 7 → 1 → 3 → 4 → 2 → 6 → 5C . 7 → 4 → 3 → 1 → 2 → 6 → 5D . 4 → 3...

December 3, 2021 No Comments READ MORE +

As shown in the figure, in a large enterprise WLAN network, the company's network administrator recently discovered that the WLAN network traffic was abnormal, and the ping gateway was delayed or a large amount of packets was lost. After excluding other possibilities, it was suspected of being an illegal network attack. Which of the following illegal attacks is most likely?

As shown in the figure, in a large enterprise WLAN network, the company's network administrator recently discovered that the WLAN network traffic was abnormal, and the ping gateway was delayed or a large amount of packets was lost. After excluding other possibilities, it was suspected of being an illegal network...

December 3, 2021 No Comments READ MORE +

As shown in the figure, in the Mesh network, which STP spanning tree protocol needs to be enabled?

As shown in the figure, in the Mesh network, which STP spanning tree protocol needs to be enabled? A . AC G0/0/1 interfaceB . MPPC . MPD . SwitchView AnswerAnswer: D

December 3, 2021 No Comments READ MORE +

Which of the following commands can be used to create an RF tuning template?

Which of the following commands can be used to create an RF tuning template?A . [AC-wlan-view] rrm-profile name wlan-netB . [AC-wlan-view] regulatory-domain-profile name domain1C . [AC-wlan-view] wired-port-profile name wired-portD . [AC-wlan-view] ap-system-profile name mesh-sysView AnswerAnswer: A

December 3, 2021 No Comments READ MORE +

In order to ensure that the IP address of each terminal is fixed as much as possible, what is the recommended approach?

There are a large number of employees in an enterprise building, and they usually start to access the company's WLAN network in the lobby when they go to work. As each employee walks to their respective working location, each person's mobile terminal also roams Roam to their respective network coverage...

December 3, 2021 No Comments READ MORE +