ExamGecko
Home / Huawei / H12-311_V3.0 / List of questions
Ask Question

Huawei H12-311_V3.0 Practice Test - Questions Answers, Page 19

Add to Whishlist

List of questions

Question 181

Report Export Collapse

At present, the security policy based on user authentication that is widely used in the enterprise network is () (Select 2 Answers)

WPA1 PSK+TKIP/CCMP

WPA1 PSK+TKIP/CCMP

WPA1 802.1X+TKIP/CCMP

WPA1 802.1X+TKIP/CCMP

WPA2 PSK+TKIP/CCMP

WPA2 PSK+TKIP/CCMP

WPA2 802.1X+TKIP/CCMP

WPA2 802.1X+TKIP/CCMP

Suggested answer: B, D
asked 22/12/2024
Yohane Phompho
36 questions

Question 182

Report Export Collapse

Huawei Box Wireless Controller AC6605 support twenty four Piece PoE Interface in WLAN Can be directly connected when networking AC of AP Make a supply Electricity.

True

True

False

False

Suggested answer: B
asked 22/12/2024
Jaimie Korik-Read
51 questions

Question 183

Report Export Collapse

Huawei Wireless AP What are the two upgrade modes download ()? (Select 2 Answers)

AC download

AC download

FTP Server download

FTP Server download

AP Bring your own

AP Bring your own

BAS

BAS

Suggested answer: A, B
asked 22/12/2024
gareth warner
24 questions

Question 184

Report Export Collapse

thin AP Find AC In the process, the first step is AP Check if there is pre-configured static AC of IP List.

True

True

False

False

Suggested answer: A
asked 22/12/2024
Pedro Pereira
45 questions

Question 185

Report Export Collapse

AP If you want to pass DNS Server fetch AC of IP Address, first get your own IP address,DHCP Server and DNS of IP address.

True

True

False

False

Suggested answer: A
asked 22/12/2024
DAVID LOPEZ MORGADO
46 questions

Question 186

Report Export Collapse

AC What is the function in the wireless network()? (Select 3 Answers)

Centralized management AP

Centralized management AP

Realize roaming function

Realize roaming function

Send beacon frame

Send beacon frame

Wireless intrusion detection

Wireless intrusion detection

Suggested answer: A, B, D
asked 22/12/2024
Sasha Grib
50 questions

Question 187

Report Export Collapse

exist WLAN In the networking configuration, finally AC6605 What command must be executed to send the configuration to AP1 middle()?

save ap id 1

save ap id 1

commit ap 1

commit ap 1

save ap 1 config

save ap 1 config

save config ap 1

save config ap 1

Suggested answer: B
asked 22/12/2024
GISELE AGNARAMON
53 questions

Question 188

Report Export Collapse

thin AP In the networking, which of the following authentication methods is not required in the authentication process AC participate().

Shared key authentication

Shared key authentication

802.1X Certification

802.1X Certification

PSK Certification

PSK Certification

Portal Certification

Portal Certification

Suggested answer: A
asked 22/12/2024
Ahmed Ebrahim
52 questions

Question 189

Report Export Collapse

Which of the following statements is correct ()?

(Select 2 Answers)

When the user performs web authentication, it is triggered by the user's http message before the IP address is successfully obtained; at this time, it is forcibly redirected to the portal server, Go through the certification process

When the user performs web authentication, it is triggered by the user's http message before the IP address is successfully obtained; at this time, it is forcibly redirected to the portal server, Go through the certification process

When the user performs web authentication, it is triggered by the user's http message after successfully obtaining the IP address; at this time, it is forcibly redirected to the portal server, Go through the certification process

When the user performs web authentication, it is triggered by the user's http message after successfully obtaining the IP address; at this time, it is forcibly redirected to the portal server, Go through the certification process

WPA2 uses 802.1X authentication

WPA2 uses 802.1X authentication

WPA only supports TKIP, an encryption technology

WPA only supports TKIP, an encryption technology

Suggested answer: B, C
asked 22/12/2024
Ronald Armas
39 questions

Question 190

Report Export Collapse

TKIP Encryption ratio WEP Encryption security is high because of (). (Select 3 Answers)

Used longer IV

Used longer IV

Added a key distribution mechanism, no longer using a single key

Added a key distribution mechanism, no longer using a single key

A more complex encryption algorithm is used

A more complex encryption algorithm is used

Adopt a stronger data verification algorithm

Adopt a stronger data verification algorithm

Suggested answer: A, B, D
asked 22/12/2024
Vincent Meuldijk
46 questions
Total 340 questions
Go to page: of 34