H12-322_V1.0-ENU Dumps
H12-322_V1.0-ENU Braindumps H12-322_V1.0-ENU Real Questions H12-322_V1.0-ENU Practice Test
H12-322_V1.0-ENU Actual Questions
HCIP-WLAN-POEW V1.0
https://killexams.com/pass4sure/exam-detail/H12-322_V1.0-ENU
Question: 60
In the case of terminal support, which of the following encryption methods support fast roaming?
wpa+psk
wpa2+psk
wpa2+802.1x
wep
Answer: C
Question: 61
A 5dB coupler has a coupling degree of 5dB and an insertion loss of 2dB. If the input signal power is 17dBm , the output power of the coupling port is :
10dBm
12dBm
14dBm
15dBm
Answer: B
Question: 62
A large enterprise wants to build an office network based on WLAN , and now wants to run a routing protocol between two core switches and multiple ACs . It requires the use of an open standard IGP protocol and supports the area division function. Which of the following protocols is the most preferred?
RIP
OSPF
EIGRP
BGP
Answer: B
Question: 63
In the VRRP hot backup scenario, which of the following description of the WAC ‘s CAPWAP source address is correct?
The address where the AP accesses the WAC is the physical address of the main WAC
WAC ‘s CAPWAP source address is the primary and standby WAC virtual address
Any address configured in WAC can be
The address where the AP accesses the WAC is the physical address of the standby WAC
Answer: B
Question: 64
In the ACU2 solution of an independent AC board in a WLAN campus network project , the switch where the board is located and the ACU2 board are logically two independent network elements, that is, independent management equipment.
TRUE
FALSE
Answer: A
Question: 65
Under normal circumstances, when the material is the same thickness, which of the following obstacles will attenuate the 2.4GHz signal the most?
Metal
Asbestos
Wooden door
Tinted glass
Answer: A
Question: 66
In the HT40 mode, the main channel sends beacon messages and some data messages, and the auxiliary channel sends other messages.
TRUE
FALSE
Answer: A
Question: 67
In order to prevent network attacks based on source address spoofing, the binding table matching check is performed on the received IP packets to prevent illegal packets from passing through the AP and improve the security of the network. Which of the following functions can be enabled?
Dynamic ARP inspection function
Flood attack prevention function
ND Snooping function
AP ‘s IPSG function
Answer: D
Question: 68
Which of the following encryption algorithms has the highest security strength?
WEP
TKIP
CCMP
DES
Answer: C
Question: 69
In a room sub-system, using AP9330DN , each indoor antenna can be set to a different channel to avoid co-frequency interference.
TRUE
FALSE
Answer: B
Question: 70
What is the core of the wireless medical positioning system ?
WIFI network
Positioning engine
TAG label
Monitoring platform
Answer: A
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG