Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! H12-321 has been withdrawn. The new exam code is H12-321_V1.0

H12-321 Practice Exam Questions with Answers Huawei Certified Network Professional - Wireless Local Area Network- Constructing Enterprise WLAN Architecture Certification

Question # 6

User information of a department is dispersed in different OUs. To better manage user information of an enterprise, the administrator adds user information of a same department to a same group, and adds all groups to an OU. Which of the following synchronization types best applies to this enterprise?

A.

OU-based synchronization

B.

Group-based synchronization

C.

Condition-based synchronization

D.

AD domain-based synchronization

Full Access
Question # 7

In the WLAN network environment, which categories can be classified according to the device security category?

A.

Legal equipment

B.

Illegal equipment

C.

Testing equipment

D.

Interference equipment

Full Access
Question # 8

Which of the following commands is used to create a radio calibration profile?

A.

[AC-wlan-view] rrm-profile name wlan-net

B.

[AC-wlan-view] regulatory-domain-profile name domain1

C.

[AC-wlan-view] wired-port-profile name wired-port

D.

[AC-wlan-view] ap-system-profile name mesh-sys

Full Access
Question # 9

Which of the following techniques are part of the way to implement STA fast roaming?

A.

PMK caching

B.

Key negotiation down

C.

Improve terminal roaming initiative

D.

Home agent is deployed on the AC

Full Access
Question # 10

On the N+1 backup network, AC3 is configured with the global priority of 5, and AC1 and AC2 are configured with the global priority of 6. The AC1 priority is set to 3 on AC1 and the AP3 priority is set to 3 on AC1 and AC2. When AC3 is unloaded, which AC device will AP1, AP2, AP3, and AP4 access?

A.

AP1 is connected to AC1, AP2 is connected to AC3, AP3 is connected to AC2, and AP4 is connected to AC3.

B.

AP1 is connected to AC3, AP2 is connected to AC3, AP3 is connected to AC3, and AP4 is connected to AC1 or AC2.

C.

AP1 is connected to AC1, AP2 is connected to AC1 or AC2, AP3 is connected to AC2, and AP4 is connected to AC1 or AC2.

D.

AP1 is connected to AC3, AP2 is connected to AC1 or AC2, AP3 is connected to AC3, and AP4 is connected to AC3.

Full Access
Question # 11

The following description of the roaming agent in the hometown is correct?

A.

Home agent is a device that can communicate with the gateway of the STA home network.

B.

Home agent is either HAC or HAP

C.

Home agent is either HAC or FAP

D.

Home agent only exists in the AC roaming network

Full Access
Question # 12

The following is true about the passive detection of neighbors?

A.

The AP passively receives neighbor messages to sense the presence of neighboring neighbor APs.

B.

Passive detection can be used by legitimate APs to collect actual interference between APs.

C.

Passive detection can be used by legitimate APs to collect interference from illegal APs.

D.

Passive detection is mainly used to establish neighbor relationships between legal APs.

Full Access
Question # 13

The WLAN Internet service is provided in public places such as banks and airports, and the user accesses the network after searching for the SSID. However, if there is a private AP and an SSID with the same or similar SSID is set, when the user searches for the SSID, the user may be mistakenly connected to the private AP, which may pose a security risk. What features can I use to solve this problem?

A.

WIDS device counter function

B.

WIDS attack detection + WIDS blacklist function

C.

WIDS attack detection + WIDS equipment counter

D.

Configure SSID counterfeit identification rules + WIDS device counter

Full Access
Question # 14

In the WLAN network, the Weak IV attack detection function does not require dynamic blacklist support.

A.

Correct

B.

False

Full Access
Question # 15

On a WLAN that uses the Agile Controller to implement admission control, which of the following statements are TRUE about the pre-authentication domain? (Multiple Choice)

A.

The method of configuring the pre-authentication domain is the same as that of configuring the post-authentication domain.

B.

If ACLs are used for the pre-authentication domain, user ACLs need to be used.

C.

There are two ways to configure the pre-authentication domain: by using ACLs, or by adding authentication-free rules.

D.

IP addresses of the following devices need to be permitted in the pre-authentication domain: antivirus gateway, firewall, and mail server.

Full Access
Question # 16

Which of the following about definition of WIPS/WIDS is TRUE?

A.

WIDS is a wireless intrusion prevention system.

B.

WIPS is a wireless intrusion detection system.

C.

WIDS is a wireless intrusion countering system.

D.

WIPS is a wireless intrusion prevention system.

Full Access
Question # 17

Packet-based power control allows an AP to select a transmit power to send data packets to a STA each time based on the current signal strength of the STA. If the AP detects that the signal strength of the STA is strong, the AP uses a low transmit power to send packets. If the AP detects that the signal strength of the STA is weak, the AP uses a high transmit power to send packets.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Which of the following commands can be used to view the AP group or AP profile information of a specified Mesh profile?

A.

display references mesh-profile

B.

display references ap-system-profile

C.

display references wired-port-profile

D.

display references radio-5g-profile

Full Access
Question # 19

What is wrong about the description of the first Fresnel zone below?

A.

The first Fresnel zone will affect the integrity of RF communications even if it is partially blocked.

B.

The Fresnel zone is blocked and the RF signal is diffracted or bent.

C.

Signal diffraction will cause the RF energy received by the antenna to decrease, and even lead to communication link interruption.

D.

In any case, the proportion of the first Fresnel zone blocked by obstacles should not exceed 60%.

Full Access
Question # 20

Smart roaming ensures that each STA can associate with the AP nearest to it. It implements load balance among APs.

A.

TRUE

B.

FALSE

Full Access
Question # 21

In the dual-link cold standby load balancing networking shown in the figure, two SSIDs Huawei and Guest are configured on AC1, and the SSID Huawei is configured on AC2. The two ACs have the same SSID Huawei configuration. API has gone online and set up the primary CAPWAP tunnel with AC1. When the primary CAPWAP tunnel between API and AC1 is disconnected and an active/standby switchover occurs, what is the service status of users connected to the SSID Guest? (Multiple Choice)

H12-321 question answer

A.

In local forwarding mode, service transmission remains uninterrupted, but new users cannot connect to the SSID Guest.

B.

In local forwarding mode, service transmission remains uninterrupted and new users can connect to the SSID Guest.

C.

In centralized forwarding mode, service transmission is interrupted and new users cannot connect to the SSID Guest.

D.

In centralized forwarding mode, service transmission remains uninterrupted, but new users cannot connect to the SSID Guest.

Full Access
Question # 22

The Agile Controller synchronization method has manual synchronization and automatic synchronization. Which of the following is true about the synchronization method?

A.

The Agile Controller can only use one synchronization mode to avoid mutual interference.

B.

The first synchronization of the Agile Controller must be synchronized manually, after which the automatic synchronization can be used.

C.

The synchronization time point of the automatic synchronization of the Agile Controller can be modified.

D.

Agile Controller manual synchronization can only be used three times a day to prevent artificially increasing network load.

Full Access
Question # 23

The illegal device defense function is to limit the AP or client access by configuring the blacklist function based on the illegal device.

A.

Correct

B.

False

Full Access
Question # 24

On the maintenance of the link status of the active and standby channels, you can prevent the TCP from being interrupted for a long time, but the protocol stack does not detect the connection interruption. You can prevent this by sending the primary and backup service packets and retransmission.

A.

Correct

B.

False

Full Access
Question # 25

Which of the following statements about a Fresnel zone is TRUE?

A.

The narrower the beamwidth, the larger the Fresnel zone.

B.

The narrower the beamwidth, the smaller the Fresnel zone.

C.

The Fresnel zone size is irrelevant to the beamwidth.

D.

None of the above.

Full Access
Question # 26

Radar systems in some areas operate in the 5G band and interfere with AP RF signals operating in the 5G band. With the DFS function, when the AP detects that there is interference in the frequency band of its working channel, engineers need to manually switch the working channel.

A.

Correct

B.

False

Full Access
Question # 27

On a WLAN network, AP group ap-group1 and WIDS profile wids1 are configured. Which of the following is the correct configuration to enable WIDS device detection?

A.

[AC-wlan-view]ap-group name ap-group1

[AC-wlan-ap-group-ap-groupl]radio 0

[AC-wlan-group-radio-ap-groupl/0]work-mode monitor

[AC-wlan-group-radio-ap-groupi/0]wids device detect enable

B.

[AC-wlan-view]ap-id 0

[AC-wlan-ap-0]radio 0

[AC-wlan-radio-0/0]work-mode monitor

[AC-wlan-radio-0/0]wids device detect enable

C.

[AC-wlan-view]wids-profile name wids1

[AC-wlan-wids-prof-widsl]device detect enable

D.

[AC-wlan-view]wids-profile name wids1

[AC-wlan-wids-prof-widsl]wids device detect enable

Full Access
Question # 28

Which routing protocol types are supported by the HWMP protocol?

A.

pro-active

B.

OSPF

C.

on-demand

D.

IGRP

Full Access
Question # 29

STAs do not need to support channel switching without service interruption for implementing this function.

A.

TRUE

B.

FALSE

Full Access
Question # 30

Engineers of a large enterprise configure the VLAN Pool function when deploying the WLAN. Which of the following options may be the reasons for configuring the function? (Multiple Choice)

A.

There are a large number of IP address requests in some areas.

B.

Users request to obtain fixed IP addresses.

C.

To reduce the broadcast domain to limit the number of broadcast packets, thereby to improve the network performance.

D.

Break the limit that one SSID can only correspond to one VLAN.

Full Access
Question # 31

Which of the following technologies are WLAN security technologies?

A.

Access authentication

B.

Wireless link encryption

C.

WDS

D.

WIPS

Full Access
Question # 32

After CAC based on channel usage is configured to control user access on an AP, if the current channel usage exceeds the configured threshold, the AP will reject access requests of new STAs and force STAs to log out until the channel usage is lower than the threshold.

A.

TRUE

B.

FALSE

Full Access
Question # 33

Which of the following statements about the revertive switchover function are TRUE in the N+1 backup scenario? (Multiple Choice)

A.

By default, global revertive switchover is enabled on the standby AC.

B.

By default, global revertive switchover is disabled on the standby AC.

C.

In the N+1 backup scenario, revertive switchover cannot be disabled on the standby AC.

D.

In the N+1 backup scenario, revertive switchover can be disabled on the standby AC.

Full Access
Question # 34

Regarding the establishment process of the backup CAPWAP link, the following statement is correct?

A.

The AP and the AC establish the primary tunnel and the backup tunnel at the same time.

B.

The AP sends a broadcast Discovery Request message to the standby AC.

C.

The Join message sent by the AP carries a custom message type, and the AC configuration has been sent.

D.

When the AC receives the Join message, the AC will skip the configuration and deliver the configuration.

Full Access
Question # 35

On a WLAN that uses the Agile Controller, which of the followings is NOT a symptom for 802.lx authentication faults?

A.

A client fails 802.1x authentication.

B.

A client passes 802.1x authentication but disconnections occur repeatedly.

C.

The test-aaa command is run successfully on the device, but the authentication page cannot be displayed.

D.

A correct user name and password are provided, but the system keeps prompting the user to enter a correct user name and password.

Full Access
Question # 36

Which of the following commands can be used to create an air interface scan template?

A.

[AC-wlan-view] rrm-profile name wlan-net

B.

[AC-wlan-view] air-scan-profile name wlan-airscan

C.

[AC-wlan-view] vap-profile name wlan-vap

D.

[AC-wlan-view] ssid-profile name wlan-ssid

Full Access
Question # 37

In intelligent roaming, when the current associated AP detects that it is a sticky terminal, the terminal that actively supports the 802.11k will actively trigger the terminal to perform neighbor measurement based on the 802.11k mechanism. Regarding this measurement, what information does the terminal mainly collect?

A.

AP's BSSID

B.

Signal strength

C.

Model of the AP

D.

The channel where the AP is located

Full Access
Question # 38

Which of the following terminal accesses is best for MAC authentication?

A.

Office running PC running Windows

B.

Testing the PC running Linux system

C.

Mobile clients for daily use, such as smartphones, etc.

D.

Network printer

Full Access
Question # 39

Which two types of spoofing attack packets are there on a WLAN? (Multiple Choice)

A.

Broadcast Disassociation frame

B.

Broadcast Deauthentication frame

C.

Unicast Disassociation frame

D.

Unicast Deauthentication frame

Full Access
Question # 40

In smart roaming, the AC instructs the AP to kick off 802.11v-incapable STAs if they are sticky STAs, add them to the blacklist, and delivers the blacklist to the APs to which the STAs associate.

A.

TRUE

B.

FALSE

Full Access
Question # 41

Which of the following is the Mesh network role?

A.

MP

B.

MPP

C.

MAP

D.

VAP

Full Access
Question # 42

A large enterprise needs to deploy a wired and wireless integrated network to facilitate unified user management and maintenance. Which of the following AC models are recommended?

A.

S12700 + ACU2

B.

AC6605

C.

AC6005

D.

S12700 + X1E card

Full Access
Question # 43

An enterprise building has a large number of employees and they usually connect to the company WLAN in the lobby when arriving at the company. As they move to their work locations, their mobile terminals roam to the current network coverage areas. To ensure that each terminal obtains a fixed IP address, which of the following configurations is recommended?

A.

Configure a VLAN pool and set the VLAN assignment algorithm to hash.

B.

Configure a VLAN pool and set the VLAN assignment algorithm to even.

C.

Configure a VLAN pool and set a VLAN assignment algorithm.

D.

Do not configure a VLAN pool but configure a static IP address for each terminal.

Full Access
Question # 44

From the roaming process, which of the following processes does roaming need to go through?

A.

Roaming measurement

B.

Roaming recognition

C.

Roaming decision

D.

Roaming execution

Full Access
Question # 45

On a WLAN with the WIDS function enabled, APs with the following MAC addresses are detected:

01-01-22-22-33-33

02-01-01-22-33-33

02-01-01-22-33-34

02-01-22-01-01-22

OUI 01-01-22 has been added to the whitelist. Which of these APs will be identified as rogue APs?

(Multiple Choice)

A.

01-01-22-22-33-33

B.

02-01-01-22-33-33

C.

02-01-01-22-33-34

D.

02-01-22-01-01-22

Full Access
Question # 46

On the N+1 backup network, a total of 300 APs from AP1 to AP300 are deployed on AC1, and 400 APs from AP301 to AP700 are deployed on AC2. The AC can be configured as a standby AP. When the AP goes online, without changing the configuration, the following statement is wrong?

A.

If the AC1 is faulty, the APs in the AP1 to AP300 will perform the active/standby switchover in the AC3.

B.

If the AC2 is faulty, the APs of the AP301 to the AP700 will perform the active/standby switchover in the AC3.

C.

If AC1 and AC2 are faulty at the same time, only the 500 APs from AP1 to AP500 can perform active/standby switchover in AC3, and the remaining 200 APs cannot go online in AC3. The services of these APs will be interrupted.

D.

After the AC1 or AC2 fails to recover, the APs that go online in AC1 and AC2 are undefined.

Full Access
Question # 47

In the dual-link cold networking, the following statement is correct?

A.

The AP only establishes a CAPWAP tunnel with the AC.

B.

The AP establishes a CAPWAP tunnel with both the primary and backup ACs.

The AP periodically exchanges CAPWAP packets with the active and standby ACs to detect link status.

C.

The AP periodically exchanges CAPWAP packets with the primary AC to detect link status.

Full Access
Question # 48

Which of the following measures can be taken to make STAs preferentially associate with the 5 GHz radio? (Multiple Choice)

A.

Configure the transmit power on the 5 GH radio 3 dB to 8 dB higher than that on the 2.4 GHz radio.

B.

Configure an AP to preferentially respond to Probe Request packets on the 5 GHz radio sent by STAs, and respond for several times before responding Probe Request packets on the 2.4 GHz radio.

C.

Configure an AP to reject the request from a STA to associate with the 2.4 GHz radio of an AP, and allow STA association only after the number of rejections reaches the threshold. Configure an AP to immediately allow STA association if a STA requests to associate with the 5 GHz radio.

D.

Configure a higher Beacon frame rate, a longer interval for sending Beacon frames, and a smaller number of retransmissions of Probe packets on the 5 GHz radio than on the 2.4 GHz radio.

Full Access
Question # 49

In the wireless access authentication, which of the following servers does the Agile Controller have?

A.

AD server

B.

LDAP server

C.

Radius server

D.

DNS server

Full Access
Question # 50

The following is the URL template configuration for the connection between the AC6005 and Portal

server. Which statement is FALSE about the URL template configuration?

url-template name huawei

url http://10.254.1.100:8080/portal

url-para meter ssid ssid

A.

The port number 8080 can be changed to 8443.

B.

The word "portal" can be changed to "webauth".

C.

The url-para meter ssid ssid command sets the SSID to ssid.

D.

The url-parameter ssid ssid command indicates that the SSID can be any SSID.

Full Access
Question # 51

What is the correct description of the second Fresnel zone below?

A.

Out of phase with point source

B.

In phase with the point source

C.

Less than the first Fresnel zone

D.

Greater than the first Fresnel zone

Full Access
Question # 52

Regarding the description of configuring a roaming group, the following statement is wrong?

A.

After the master controller is enabled on the AC, the master controller is added to the roaming group by default and can manage other ACs.

B.

The Master Controller is delivered to each managed AC through CAPWAP signaling.

C.

Master Controller is a logical role that can be taken over by any common entity AC.

D.

Each AC needs to specify an AC as its own Master Controller.

Full Access
Question # 53

Regarding the role of each role in the Portal authentication architecture, is the following description correct?

A.

The RADIUS server stores information such as the username and password for authentication of the access user.

B.

The portal server stores information such as the username and password for authentication of the access user.

C.

The RADIUS server is used to push the Portal authentication page to the user.

D.

Portal server is used to push the Portal authentication page to the user.

Full Access
Question # 54

Which of the following commands can be used to view the role of Mesh?

A.

display wlan mes route

B.

display ap-system-profile

C.

display mesh-profile

D.

display mesh vap

Full Access
Question # 55

As shown in the figure, in the dual-link cold backup load balancing network, as shown in the figure, the two SSIDs of the Huawei and the guest are configured on the AC1, and the SSID of the Huawei is configured on the AC2. The same SSID configuration is the same, and AP1 is online. AC1 and AP1 establish the primary line first. After the AP1 is disconnected from the AC1 link and the active/standby switchover is sent, what is the service status of the user accessed by the Guest SSID?

A.

The service in the local forwarding mode is uninterrupted, and new users cannot access the guest.

B.

The service in the local forwarding mode is uninterrupted, and new users can access the guest.

C.

The service is interrupted in the centralized forwarding mode, and new users cannot access the Guest.

D.

The service in the centralized forwarding mode is uninterrupted, and new users cannot access the Guest.

Full Access
Question # 56

Regarding the default configuration of the common parameters of dual-link cold backup, the following statement is correct?

A.

AC global priority is 0

B.

AC personality priority is 0

C.

Dual link backup and failback is not enabled

D.

Dual link backup function enabled

Full Access
Question # 57

What is the correct configuration for referencing a wired interface template?

A.

[AC-wlan-view] ap-group name mesh-mpp [AC-wlan-ap-group-mesh-mpp] mesh-profile mesh-net radio 1

B.

[AC-wlan-view] ap-group name mesh-mpp [AC-wlan-ap-group-mesh-mpp] regulatory-domain-profile domain 1

C.

[AC-wlan-view] ap-group name mesh-mpp [AC-wlan-ap-group-mesh-mpp] wired-port-profile wired-port gigabithernet 0

D.

[AC-wlan-view] ap-group name mesh-mpp [AC-wlan-ap-group-mesh-mpp] ap-system-profile mesh-sys

Full Access
Question # 58

Which of the following is NOT the purpose of WLAN device upgrade?

A.

To fix existing problems.

B.

To optimize device performance.

C.

To obtain new features and functions.

D.

To prolong the service life of the device.

Full Access
Question # 59

Which statements are TRUE based on the network of WLAN roaming? (Multiple Choice)

H12-321 question answer

A.

For intra-AC roaming/ AC1 serves as the HAC for STAs.

B.

For intra-AC roaming, AC2 serves as the FAC for STAs.

C.

For inter-AC roaming, API serves as the HAP for STAs.

D.

For inter-AC roaming, AP3 serves as the FAP for STAs.

Full Access
Question # 60

Which of the following statements about active neighbor probe is FALSE?

A.

An AP periodically sends Probe Request frames destined for a specified multicast address on different channels. After receiving the frames, surrounding APs learn that the AP is a neighbor.

B.

Active probe is used to establish neighbor relationships between authorized APs.

C.

Active probe is used to obtain the maximum interference signal strength between authorized neighboring APs, in which signal strength of the neighboring AP is the key.

D.

Active probe and passive probe are used to collect interference information from rogue APs.

Full Access
Question # 61

What is the correct statement about the Mesh RF parameters?

A.

Mesh enabled RF is best to use 2.4G frequency band

B.

The “distance” parameter configuration of adjacent Mesh nodes should be the same

C.

It is best to configure the short GI mode to improve the air interface bandwidth of the Mesh regardless of the distance.

D.

The power parameters of adjacent Mesh nodes should be configured identically to avoid bidirectional transmission bandwidth imbalance.

Full Access
Question # 62

After channel switching without service interruption is configured on an AP, when the AP channel needs to be switched, the AP will notify associated STAs in advance and switch to the new channel with STAs at the same time without interrupting services.

A.

TRUE

B.

FALSE

Full Access
Question # 63

The AP periodically sends a Discovery Request packet to check the status of the original primary link. After the link is restored, the AP detects that the link has a higher priority than the currently used primary link and triggers the switchback. To prevent frequent network switching, the AC is notified of the active/standby switchover. The AP sends the data service of the STA to the newly upgraded AC.

A.

Correct

B.

False

Full Access
Question # 64

Which statements about 802.1x and RADIUS is TRUE?

A.

802.lx and RADIUS are different names of the same technology.

B.

802.lx is a technological system/ in which RADIUS is included.

C.

802.lx and RADIUS are different technologies/ but they are often used together for user access control.

D.

802.lx and RADIUS are different and are not used together.

Full Access
Question # 65

Which of the following admission control information can be imported on the Agile Controller in batches?

(Multiple Choice)

A.

Access device information

B.

Department information

C.

User information

D.

Authorization result

E.

Authorization element

Full Access
Question # 66

In intelligent roaming, for a terminal that supports 802.1v, the AP can assign a target AP to it, requiring it to roam actively without kicking the user off the line.

A.

Correct

B.

False

Full Access
Question # 67

What is wrong about the description of the business VAP below?

A.

Provide wireless terminal access

B.

Establish MESH connection establishment

C.

Each RF can be configured in multiples, and the number is not limited.

D.

Each RF can be configured with only one

Full Access
Question # 68

When the AP receives a Probe request from 2.4G, if it can only receive a 2.4G Probe request for a continuous period of time, it considers that the terminal only supports the 2.4G band; otherwise, the terminal is considered to be a dual-band terminal. This logic also applies to 5G radios.

A.

Correct

B.

False

Full Access
Question # 69

In the WLAN network using the Agile Controller as the admission controller, which of the following options is not the cause of the 802.1x authentication failure?

A.

The key of the Agile Controller access device is inconsistent with the configuration key on the device.

B.

The billing cycle is not configured

C.

Port 1813 is occupied on the server.

D.

Authorization rule matching is to deny access

Full Access
Question # 70

Which is NOT the management frame of 802.11s routing protocol?

A.

RANN

B.

PREQ

C.

PREP

D.

PS-Poll

Full Access
Question # 71

In the load balancing mode, what is the correct way for each server to handle hot standby?

A.

The DHCP server does not automatically associate with the relay on the device. The server will send dhcp request packets to the device.

B.

The DHCP server and the relay on the device can be adaptively linked. The server does not actively send protocol packets to the device.

C.

The RADIUS/Portal Server does not need to configure the IP address of the peer device, and the server does not actively send COA/DM or Portal logoff packets to the device.

D.

The RADIUS/Portal Server needs to be configured with the IP address of the peer device, and the server will send the COA/DM or Portal logoff packets to the device.

Full Access
Question # 72

Which of the following statements are TRUE about band steering supported by Huawei devices? (Multiple Choice)

A.

Load balancing between the 2.4 GHz and 5 GHz radios is considered in band steering. An AP determines the radio with which a STA preferentially associates based on numbers of access users on the 2.4 GHz and 5 GHz radios.

B.

Check whether the number of access users on an AP exceeds the start threshold for load balancing between radios. If not, STAs can preferentially associate with the 5 GHz radio.

C.

If the number of access users on an AP exceeds the start threshold for load balancing between radios, the AP determines the frequency band to which the STA connects based on radio load difference computed according to the formula (Number of access users on the 5 GHz radio -Number of access users on the 2.4 GHz radio/Number of access users on the 5 GHz radio x 100%).

D.

After the number of users associated with an AP reaches the start threshold for load balancing between radios, if the value obtained based on the formula (Number of access users on the 5 GHz radio - Number of access users on the 2.4 GHz radio/Number of access users on the 5 GHz radio x 100%) is greater than the gap-threshold value, the AP preferentially associates with the STA on the 5 GHz radio.

Full Access
Question # 73

What are the benefits of intelligent roaming?

A.

Improve the terminal's own business experience and overall performance of the wireless channel

B.

Improve wireless channel performance

C.

Load balancing

D.

Spectrum navigation

Full Access
Question # 74

What user identity authentication modes does the Agile Controller support? (Multiple Choice)

A.

Authentication using a common account

B.

Third-party authentication

C.

Authentication using a digital certificate

D.

MAC address bypass authentication

Full Access
Question # 75

When the dual-link hot standby switchover is performed, what is the correct behavior about the AP and the user?

A.

AP does not need to go online again

B.

AP needs to go online again

C.

Users do not need to go online again

D.

Users need to go online again

Full Access
Question # 76

Regarding the description of Layer 2 roaming and Layer 3 roaming, is the following statement correct?

A.

The VLANs on the AP service set associated with STAs before and after Layer 3 roaming are different.

B.

If the VLAN IDs of the STAs are the same before and after the STA roams, they must belong to Layer 2 roaming.

C.

Layer 2 roaming means that the client roams in the same subnet

D.

Layer 3 roaming means that the client roams between different subnets.

Full Access
Question # 77

In the dual-link HSB networking diagram shown in the figure, API is allowed to connect to both ACs. Which AC will API connect to?

H12-321 question answer

A.

AC1

B.

AC2

C.

Either of them

D.

None of them

Full Access
Question # 78

When the VRRP hot backup is configured, the active and standby ACs can be hot standby through Layer 3 interworking on two different Layer 2 networks.

A.

Correct

B.

False

Full Access
Question # 79

The Agile Controller can synchronize user information with the AD or LDAP directory server. Therefore, the Agile Controller can synchronize user information with any directory server that supports the LDAP directory service protocol.

A.

TRUE

B.

FALSE

Full Access
Question # 80

The Agile Controller can synchronize data either manually or automatically. Which of the following statements is TRUE about the two synchronization modes?

A.

The Agile Controller can only use one synchronization mode, which prevents interference between the two modes.

B.

The first synchronization must be manual, and automatic synchronization can be used subsequently.

C.

The automatic synchronization time can be modified.

D.

Manual synchronization can be used only three times within a single day, which prevents increase of network loads.

Full Access