The products and systems provided by BYOD solutions cover many fields such as terminal, network, security, application, and management, including: serialized BYOD equipment, wireless network system, network access security, VPN gateway, terminal security client software, Authentication system, mobile device management (MDM), mobile eSpace UC, etc.

The products and systems provided by BYOD solutions cover many fields such as terminal, network, security, application, and management, including: serialized BYOD equipment, wireless network system, network access security, VPN gateway, terminal security client software, Authentication system, mobile device management (MDM), mobile eSpace UC, etc.
A . True
B . False

Answer: A

The products and systems provided by BYOD solutions cover many fields such as terminal, network, security, application, and management, including: serialized BYOD equipment, wireless network system, network access security, VPN gateway, terminal security client software, Authentication system, mobile device management (MDM), mobile eSpace UC, etc.

The products and systems provided by BYOD solutions cover many fields such as terminal, network, security, application, and management, including: serialized BYOD equipment, wireless network system, network access security, VPN gateway, terminal security client software, Authentication system, mobile device management (MDM), mobile eSpace UC, etc.
A . True
B . False

Answer: A

Regarding the use of user isolation technology in a WLAN networking environment, which of the following statements is false?

Regarding the use of user isolation technology in a WLAN networking environment, which of the following statements is false?
A . User isolation between groups means that users in different groups cannot communicate, but internal users in the same group can communicate
B . Isolation within a user group means that users within the same group cannot communicate with each other
C . The user isolation function means that the Layer 2 packets between all wireless users associated with the same AP cannot be forwarded to each other
D . Intra-group isolation and inter-group isolation cannot be used at the same time

Answer: D

Regarding the deployment scenarios of hardware SACG certification, which of the following descriptions are correct? (Multiple Choice)

Regarding the deployment scenarios of hardware SACG certification, which of the following descriptions are correct? (Multiple Choice)
A . SACG authentication is generally used in the scenarios where a stable network is used for wired access control.
B . SACG authentication is generally used in the scenario of wireless admission control of a new network.
C . SACG is generally deployed in a bypass mode without changing the original network topology.
D . SACG essentially controls access users through 802.1X technology.

Answer: AC

When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?

When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?
A . When adding accounts individually, you can choose to create them individually.
B . If there are many users, you can choose to create them in batches.
C . If the number of users is relatively large, you can choose database synchronization.
D . In order to facilitate management and improve user experience, self-registration can be used.

Answer: C

Which of the following options are correct for the description of MAC authentication and MAC bypass authentication? (Multiple Choice)

Which of the following options are correct for the description of MAC authentication and MAC bypass authentication? (Multiple Choice)
A . MAC authentication is an authentication method that controls users’ network access rights based on interfaces and MAC addresses. It does not require users to install any client software.
B . MAC bypass authentication first performs 802.1X authentication on the access authentication device. If the device does not respond to 802.1X authentication, MAC authentication is used to verify the legitimacy of the device.
C . During the MAC authentication process, the user needs to manually enter the username or password.
D . During the MAC bypass authentication process, the MAC address is not used as the username and password to automatically access the network.

Answer: AB

In the Windows environment, after the Agile Controller-Campus is successfully installed, how to manually start the Management Center (MC)? (Multiple Choices)

In the Windows environment, after the Agile Controller-Campus is successfully installed, how to manually start the Management Center (MC)? (Multiple Choices)
A . Double-click the "Start Server" shortcut on the desktop to start it.
B . Choose Start > All Programs > Huawei > MCServer > Start Server.
C . Choose Start > All Programs > Huawei > Agile Controller > Server Startup Config to manually start the required components.
D . Choose Start > All Programs > Huawei > MCServer > Server Startup Config to manually start the required components.

Answer: AB