Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-311_V3.0 Questions and Answers

Question # 6

802.11 In the frame, it is used to record the network allocation vector ( NAVWhat is the value of ()?

A.

Frame Control

B.

Duration

C.

address Bit

D.

Sequence control bit

Full Access
Question # 7

The following Huawei AP Which AP support SFP Fiber interface()?

A.

AP6010DN

B.

AP6310SN

C.

AP6510DN

D.

AP6610DN

Full Access
Question # 8

Various pipes, metal keels and aluminum alloy gussets in the ceiling will have a greater impact on the actual signal coverage effect.

A.

True

B.

False

Full Access
Question # 9

Among the following options, the common WLAN The source of interference is ().

(Select 3 Answers)

A.

Micro-wave oven

B.

remote control

C.

cordless phone

D.

Bluetooth transmission equipment

Full Access
Question # 10

If the terminal supports 5GHz and 2.4GHz Function, then AP Can be configured to control this kind of terminal priority access 5GHz .

A.

True

B.

False

Full Access
Question # 11

If you want to create an open authentication security template, the following correct configuration is ().

A.

AC-WLAN-view] security-profile name security-1 id 1

[AC-WLAN-sec-prof-security-1] open authentication-method open-system

[AC-WLAN-sec-prof-security-1] security-policy open

[AC-WLAN-sec-prof-security-1] quit

B.

AC-WLAN-view] security-profile name security-1 id 1

[AC-WLAN-sec-prof-security-1] wep authentication-method open-system

[AC-WLAN-sec-prof-security-1] security-policy wep

[AC-WLAN-sec-prof-security-1] quit

C.

AC-WLAN-view] security-profile name security-1 id 1

[AC-WLAN-sec-prof-security-1] wpa authentication-method open-system

[AC-WLAN-sec-prof-security-1] security-policy wpa

[AC-WLAN-sec-prof-security-1] quit

D.

AC-WLAN-view] security-profile name security-1 id 1

[AC-WLAN-sec-prof-security-1] wpa2 authentication-method open-system

[AC-WLAN-sec-prof-security-1] security-policy wpa2

[AC-WLAN-sec-prof-security-1] quit

Full Access
Question # 12

Which of the following is correct about the power calculation ()?

(Select 3 Answers)

A.

0 dBm = 1 mW

B.

3 dBm = 2 mW

C.

10 dBm = 100mW

D.

27 dBm = 500mW

Full Access
Question # 13

In the following description of WEP encryption, the error is ().

A.

WEP encryption uses a stream encryption algorithm

B.

WEP encryption adds IV to destroy the regularity of the key

C.

The length of IV in WEP encryption is 48 bits

D.

WEP encryption allows the device to store four keys at the same time

Full Access
Question # 14

What series of Huawei switches () is the Huawei plug-in controller ACU board suitable for?

(Select 3 Answers)

A.

S9300 series switches

B.

S9700 series switches

C.

S7700 series switches

D.

S5700 series switches

Full Access
Question # 15

1999 Year, IEEE 802.11a The standard formulation is completed. The standard stipulates that the working frequency band of wireless local area network can reach the transmission rate 11Mbps .

5.15 ~5.825GHz , Data transmission

A.

True

B.

False

Full Access
Question # 16

because 802.11a The maximum rate supported is the same as 802.11g. The maximum rate supported is the same, so 802.11a Protocol is backward compatible 802.11g Agreement.

A.

True

B.

False

Full Access
Question # 17

Metal objects have a greater attenuation effect on wireless signals, AP Or the antenna should not be placed behind a metal ceiling, etc.

A.

True

B.

False

Full Access
Question # 18

antenna A The gain is 11dBi ,antenna B The gain is 8dBi , You can say the antenna A Than antenna B The gain is large ().

A.

3 dB

B.

3 dBi

C.

3 dBd

D.

uncertain

Full Access
Question # 19

For outdoor WLAN Cover, the following statement is correct ().

(Select 3 Answers)

A.

The higher the antenna gain, the stronger the antenna directivity, and the weaker the radiation gain directly below the antenna

B.

The feeder interface must match the selected antenna

C.

The length of the feeder must not exceed 2 rice

D.

Outdoor antennas should not blindly pursue high gain

Full Access
Question # 20

about AP6610DN , The following statement is wrong ().

A.

AP6610DN Is enhanced outdoor AP

B.

AP6610DN Is dual frequency AP,in 5GHz Frequency band can be used for wireless bridging and user access

C.

AP6610 Only one Ethernet interface, the highest bandwidth 1000M

D.

AP66010DN Support both Ethernet interface and optical fiber interface

Full Access
Question # 21

WLAN middle,AP It has been working in a half-duplex state.

A.

True

B.

False

Full Access
Question # 22

Among the following options, () is a prerequisite for enabling Huawei's load balancing function.

A.

AP Belong to the same type

B.

AP In the same AC Under management, and AP Signal overlap

C.

STA Can scan to each other for load balancing AP

D.

AP The output power settings are the same

Full Access
Question # 23

pass through FTP Way to upgrade AP, You need to ensure AP and FTP Servers can communicate with each other, and AP Put the upgrade file in FTP Root directory.

A.

True

B.

False

Full Access
Question # 24

After one data frame is sent and confirmed, what is the time interval to wait before sending the next data frame ()?

A.

SIFS

B.

IFS

C.

DIFS

D.

PIFS

Full Access
Question # 25

Which of the following protocols can support at the same time 2.4GHz Frequency band and 5GHz Frequency band()?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Full Access
Question # 26

The following statement about the AP access control method is incorrect ().

(Select 2 Answers)

A.

By default, the control method for AP to access AC is non-authentication

B.

By configuring the AP in an offline state, authentication is required to automatically access

C.

The configuration whitelist can be authenticated based on MAC or SN

D.

If MAC authentication is used for AP access control, APs outside of the MAC authentication list can also go online after manual confirmation

Full Access
Question # 27

MIMO(Multiple input and multiple output) The client can use at most 3 Two spatial streams transmit data at the same time, and the maximum theoretical rate can reach , That is, multiple input and multiple output, using 600Mbps . 802.11n Technology wireless access point and guest

A.

True

B.

False

Full Access
Question # 28

Which of the following descriptions of business VLAN is correct is ().

(Select 3 Answers)

A.

Mainly responsible for transmitting data when WLAN users go online

B.

PVID VLAN under the WLAN ESS interface

C.

Service VLAN under the service set template

D.

If the data tunnel is used for forwarding, user data will not be transmitted through the business VLAN business

Full Access
Question # 29

Which of the following AP Mode does not belong to WDS The internet()?

A.

Root AP

B.

Middle AP

C.

Bridge AP

D.

Leaf AP

Full Access
Question # 30

QoS What kinds of service models are included ()

(Select 3 Answers)

A.

Best Effort Model

B.

IntServ Model

C.

FIFO Model

D.

DiffServ Model

Full Access
Question # 31

Barker Code is a 11 Bit sequence (e.g. 10110111000 ), there are advantages in wireless transmission, which can effectively reduce interference, but it reduces efficiency.

A.

True

B.

False

Full Access
Question # 32

What is the recommended AC-ID for Huawei wireless controllers when configuring enterprise network WLAN services ()?

A.

cmcc (China Mobile)

B.

ctc (China Telecom)

C.

cuc (China Unicom)

D.

other (other)

Full Access
Question # 33

CAPWAP The agreement is made by IEEE Standards organization in 2009 year 4 One of the month WLAN Standard for AC And thin AP Communication between.

A.

True

B.

False

Full Access
Question # 34

exist 1 Floor deployment 3 Piece AP, The channels from left to right are 1,6,11, At this time 2 Floor deployment 3 Piece AP Channel should be be divided into( ).

A.

1 ,6,11

B.

2 ,7,12

C.

6 ,11,1

D.

11 ,6,1

Full Access
Question # 35

exist 802.1X In the agreement, you must have () to be able to complete the authentication and authorization of the user. (Select 3 Answers)

A.

eSight server

B.

Client

C.

Authenticator

D.

Authentication server

Full Access
Question # 36

Antennas are classified according to directivity and can be divided into () antennas and () antennas.

(Select 2 Answers)

A.

Plate

B.

paraboloid

C.

Omnidirectional

D.

Orientation

Full Access
Question # 37

How many management nodes () does eSight Standard Edition support at most?

A.

60

B.

2000

C.

5000

D.

20000

Full Access
Question # 38

Which of the following statements are correct () ? (Select 3 Answers)

(Select 3 Answers)

A.

WDS can transmit the data of the wired network through the wireless network as a relay structure, so that the network data can be transmitted to another wireless network

Network environment, or another wired network.

B.

The wireless network bridging function usually refers to one-to-one, but the WDS architecture can do one-to-many.

C.

WDS can allow wireless APs to bridge (relay) wirelessly, but the bridged wireless APs cannot provide coverage at the same time.

D.

Because the virtual network line is formed through the wireless network, WDS is also called the wireless network bridging function.

Full Access
Question # 39

802.11 In the frame, Frame Control In position Type What is the correct correspondence with the frame format ()?

A.

Type for 01 Time represents data frame

B.

Type for 10 Time represents control frame

C.

Type for 00 Indicates reserved use

D.

Type for 00 Time represents management

Full Access
Question # 40

The following description of TKIP encryption is wrong ().

A.

The length of IV used in TKIP encryption is 24 bits

B.

TKIP encryption uses the same encryption algorithm as WEP encryption

C.

The motivation for developing TKIP encryption is to upgrade the security of the old WEP hardware

D.

TKIP encryption adds the mechanism of Key generation, management and transmission

Full Access
Question # 41

Configure the security policy of the wireless network as WEP , You need to AC6605 The security template is configured as follows ().

A.

security-policy wep

wep authentication-method open

wep key wep-40 hex 0 1234567890

wep default-key 0

B.

security-policy wep

policy wep share-key

wep key wep-40 hex 0 1234567890

wep default-key 0

C.

authentication policy wpa

wpa authentication-method share-key

wpa key wpa-40 hex 0 1234567890 wpa

default-key 0

D.

authentication policy wpa2

wpa2 authentication-method share-key

wpa2 key wpa2-40 hex 0 1234567890

wpa2 default-key 0

Full Access
Question # 42

Which of the following agreements are IEEE customized 802.11 standard() ? (Select 3 Answers)

A.

802.11a/b/g/n

B.

802.11i

C.

802.1X

D.

802.11s

Full Access
Question # 43

Defined WLAN Medium service quality 802.11 The agreement is ().

A.

802.11f

B.

802.11i

C.

802.11e

D.

802.11n

Full Access
Question # 44

PPPoE Certified in WLAN When used, and WLAN The authentication encryption used by itself does not matter.

A.

True

B.

False

Full Access