On a WLAN that uses the Agile Controller to implement admission control, which of the following statements are TRUE about the pre-authentication domain? (Multiple Choice)
A. The method of configuring the pre-authentication domain is the same as that of configuring the post-authentication domain.
B. If ACLs are used for the pre-authentication domain, user ACLs need to be used.
C. There are two ways to configure the pre-authentication domain: by using ACLs, or by adding authentication-free rules.
D. IP addresses of the following devices need to be permitted in the pre-authentication domain: antivirus gateway, firewall, and mail server.
In the indoor environment, signal reflection, refraction, diffraction, and scattering of walls and other obstacles are main factors affecting the link quality. The Fresnel zone is also an important factor.
A. TRUE
B. FALSE
Which of the following is NOT the purpose of WLAN device upgrade?
A. To fix existing problems.
B. To optimize device performance.
C. To obtain new features and functions.
D. To prolong the service life of the device.
As shown in the figure, in the Mesh networking, what is required to enable the STP spanning tree protocol?
A. AC G0/0/1 interface
B. MPP
C. MP
D. Switch
Which of the following is the WLAN security threat?
A. Weak IV attacks
B. WDS
C. WIDS
D. WIPS
Regarding the processing of the WLAN dual-system hot standby to the server, the following statement is correct?
A. VRRP hot standby scenario, the active and standby ACs can advertise VIP/VMAC to the server. Only one device uses VIP to interact with the server.
B. In a load balancing scenario, only one AC interacts with the server.
C. VRRP hot standby scenario, the active and standby ACs can send VIP/VMAC to the server, and both devices use VIP to interact with the server.
Which of the following behaviors are WLAN network security threats?
A. Weak IV attack
B. WDS
C. WIDS
D. WIPS
Improper processing of which of the following packets will lead to packet congestion? (Multiple Choice)
A. Unknown unicast packets
B. Broadcast packets
C. Multicast packets
D. Anycast
In a WLAN network environment, after a Spoof spoofing attack, the attacking terminal cannot be determined by the MAC address.
A. Correct
B. False
Which of the following commands can be used to create an air interface scan template?
A. [AC-wlan-view] rrm-profile name wlan-net
B. [AC-wlan-view] air-scan-profile name wlan-airscan
C. [AC-wlan-view] vap-profile name wlan-vap
D. [AC-wlan-view] ssid-profile name wlan-ssid