Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Huawei H12-311_V3.0 Practice Exam with Questions & Answers | Set: 7

Questions 61

For the following WLAN networking configuration, which statement is correct ().

(Select 3 Answers)

Options:
A.

The user tries his best to ensure that the planning data is detailed when planning the data, which will greatly facilitate the later configuration

B.

Before sending the configuration to the AP, the AP must be online

C.

Configure the WMM template can be directly bound to the antenna

D.

The WMM template is bound to the RF template

Huawei H12-311_V3.0 Premium Access
Questions 62

In the following options, () is not the main purpose of roaming.

Options:
A.

Avoid long authentication time during roaming, resulting in packet loss or even business interruption

B.

Ensure that the user authorization information remains unchanged

C.

Guarantee users IP The address remains unchanged

D.

Ensure that the user's network rate remains unchanged

Questions 63

BSS Full name Basic Service Set ,BSS It can be divided Independent BSS and Infrastructure BSS Two kinds.

Options:
A.

True

B.

False

Questions 64

If you want to create an open authentication security template, the following correct configuration is ().

Options:
A.

AC-WLAN-view] security-profile name security-1 id 1

[AC-WLAN-sec-prof-security-1] open authentication-method open-system

[AC-WLAN-sec-prof-security-1] security-policy open

[AC-WLAN-sec-prof-security-1] quit

B.

AC-WLAN-view] security-profile name security-1 id 1

[AC-WLAN-sec-prof-security-1] wep authentication-method open-system

[AC-WLAN-sec-prof-security-1] security-policy wep

[AC-WLAN-sec-prof-security-1] quit

C.

AC-WLAN-view] security-profile name security-1 id 1

[AC-WLAN-sec-prof-security-1] wpa authentication-method open-system

[AC-WLAN-sec-prof-security-1] security-policy wpa

[AC-WLAN-sec-prof-security-1] quit

D.

AC-WLAN-view] security-profile name security-1 id 1

[AC-WLAN-sec-prof-security-1] wpa2 authentication-method open-system

[AC-WLAN-sec-prof-security-1] security-policy wpa2

[AC-WLAN-sec-prof-security-1] quit

Questions 65

MIMO The antenna configuration is usually expressed as " M*N ",in M and N What does each mean ()?

(Select 2 Answers)

Options:
A.

M Indicates the number of transmission antennas

B.

N Indicates the number of transmission antennas

C.

N Indicates the number of receiving antennas

D.

M Indicates the number of receiving antennas

Questions 66

Which of the following statements are correct () ? (Select 3 Answers)

(Select 3 Answers)

Options:
A.

WDS can transmit the data of the wired network through the wireless network as a relay structure, so that the network data can be transmitted to another wireless network

Network environment, or another wired network.

B.

The wireless network bridging function usually refers to one-to-one, but the WDS architecture can do one-to-many.

C.

WDS can allow wireless APs to bridge (relay) wirelessly, but the bridged wireless APs cannot provide coverage at the same time.

D.

Because the virtual network line is formed through the wireless network, WDS is also called the wireless network bridging function.

Questions 67

AP The systematic process of radio frequency resource management is ().

Options:
A.

Acquisition -> Decision -> Analysis -> Execution

B.

Analysis -> Acquisition -> Decision -> Execution

C.

Acquisition -> Analysis -> Execution -> Decision

D.

Acquisition -> Analysis -> Decision -> Execution

Questions 68

AP Transmit power 20dBm , Antenna gain 4dBi , Cable and device loss 1dB , Terminal receiving antenna gain 2dBi , Space propagation loss 80dB , Terminal receiving level RSSI= ().

Options:
A.

-57

B.

-56

C.

-55

D.

-54

Questions 69

Which of the following types of frames is the 802.11 ACK frame?

Options:
A.

Control frame

B.

Null data frame

C.

Data frame

D.

Management frame

Questions 70

QoS What kinds of service models are included ()

(Select 3 Answers)

Options:
A.

Best Effort Model

B.

IntServ Model

C.

FIFO Model

D.

DiffServ Model