A. Service VLAN
B. User VLAN
C. Management VLAN
D. Authentication VLAN
A. 180
B. 360
C. 90
D. 0
A. True
B. False
A. Using a stronger data verification algorithm
B. Adopting a more complex encryption algorithm
C. Added a key distribution mechanism, no longer using a single key
D. Adopt a longer IV
A. Downward compatible with 802.11a/b/g protocol
B. Maximum theoretical transmission rate is increased to 600Mbps
C. Support MIMO technology
D. The other three items are correct
A. Spoof attack detection
B. Flood attack detection
C. Microwave interference detection
D. Weak IV attack detection
A. Start the switch when the network speed is very slow when it is associated with the original AP.
B. Check the packet loss rate and start switching when the packet loss rate reaches a certain value.
C. Set the signal strength ratio between the current AP and the neighbor AP, and switch to the threshold.
D. Start the switch after the STA reaches a certain distance from the original AP.
A. Configure AC-ID
B. Configure AC WLAN source interface
C. Configure AC country code
D. Configure Radio template
A. 11
B. 14
C. 13
D. 3
A. The web authentication is triggered by the user's http packet before the IP address is successfully obtained. At this time, the user is forced to redirect to the portal server to perform the authentication process.
B. WPA only supports one encryption technology of TKIP
C. When the user obtains the IP address successfully, the user triggers the HTTP packet of the user. At this time, the user is forced to redirect to the portal server to perform the authentication process.
D. WPA2 uses 802.1X authentication
A. Side-by-side mode + direct forwarding
B. Direct connection mode + direct forwarding
C. Direct connection mode + tunnel forwarding
D. Side-by-side mode + tunnel forwarding
A. 802.11b
B. 802.11n
C. 802.11a
D. 802.11g
A. QPSK
B. OFDM
C. FHSS
D. DSSS
A. The user wireless network card is not enabled or the wireless network card hardware switch is not turned on.
B. The wireless controller is configured with user isolation
C. User wireless network card driver is abnormal
D. AP is configured with 5G priority, resulting in 2.4G wireless client not searching for signals.
A. mac-sn-auth
B. sn-auth
C. mac-auth
D. no-auth