In the 802.11s routing protocol, the following is not a route management frame?
A. RANN
B. PREQ
C. PREP
D. PS-Poll
As shown in the following figure, the forwarding of data traffic before roaming is STA-HAP-HC-upper layer network. The forwarding mode is tunnel forwarding. After three layers of roaming, what is the forwarding traffic of data?
A. STA-FAP-FAC-HAC-upper layer network
B. STA-FAP-FAC-HAC-HAP-HAC-upper layer network
C. STA-FAP-FAC-upper layer network
D. STA-FAP-FAC-HAC-FAC-upper layer network
In the following configuration for the connection between the AC6005 and Portal server, what is the function of port 50200? web-auth-server huawei server-ip 10.254.1.100 port 50200 shared-key ciper huawei url-template huawei
A. Destination port number in the packets that the AC6005 sends to the Portal server
B. Number of the port that the AC6005 uses to process Portal protocol packets
C. Source port number in the packets that the AC6005 sends to the Portal server
D. Number of the port that the AC6005 uses to receive Portal protocol packets
Which of the following commands can be used to view the AP group or AP profile information of a specified Mesh profile?
A. display references mesh-profile
B. display references ap-system-profile
C. display references wired-port-profile
D. display references radio-5g-profile
On a large WLAN network, you can set the DSCP priority of CAPWAP management packets to high priority to improve the reliability of the CAPWAP link between the AP and the AC.
A. Correct
B. False
Which of the following radio calibration modes are supported by Huawei devices? (Multiple Choice)
A. Auto mode
B. Manual mode
C. Schedule mode
D. Autosensing mode
Which statements about Layer 2 and Layer 3 roaming are TRUE? (Multiple Choice)
A. After Layer 3 roaming is performed, the VLAN IDs in the service set of APs are changed.
B. If the VLAN IDs before and after roaming are the same, the STA roams at Layer 2.
C. Layer 2 roaming indicates that STAs roam within the same subnet.
D. Layer 3 roaming indicates that STAs roam between different subnets.
In the WLAN network, which of the following will trigger an alarm?
A. Flood attack
B. Spoof attack
C. Weak IV attack
D. Violent cracking
Which of the following statements about rogue device countermeasure on a WLAN with the WIDS function enabled are TRUE? (Multiple Choice)
A. After an AC identifies a rogue AP, it sends rogue AP information to a monitor AP. The monitor AP sends a broadcast Deauthentication frame with the rogue AP's identity information.
B. After an AC identifies a rogue AP, it sends rogue AP information to a monitor AP. The monitor AP sends a unicast Deauthentication frame with the rogue AP's identity information.
C. After an AC identifies a rogue STA, it sends rogue STA information to a monitor AP. The monitor AP sends a unicast Deauthentication frame with the rogue STA's BSSID or MAC address.
D. After an AC identifies a rogue STA, it sends rogue STA information to a monitor AP. The monitor AP sends a broadcast Deauthentication frame with the rogue STA's BSSID or MAC address.
What is the correct formula for the Earth's curvature below?
A. a
B. b
C. c
D. d