Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H19-401_V1.0 - HCSP-Presales-Campus Network Planning and Design V1.0

Page: 2 / 2
Total 60 questions

In Huawei's CloudCampus Solution, network devices on small- and medium-sized campus networks can work in either cloud-based or traditional management mode. However, tenants cannot manage upgraded devices working in traditional mode on the cloud management platform.

A.

TRUE

B.

FALSE

Which of the following statements are true about Layer 2 WLAN networking?

A.

This networking is applicable to complex and refined WLANs of large enterprises.

B.

The WAC and APs are located in the same broadcast domain.

C.

Service data must pass through the WAC.

D.

APs can discover the WAC by broadcasting packets.

Which of the following statements is true about the WLAN traffic forwarding model?

A.

In both direct and tunnel forwarding modes, after Layer 2 roaming is complete, traffic is forwarded to the home agent through a CAPWAP tunnel.

B.

In direct forwarding mode, after Layer 2 roaming is complete, traffic is directly forwarded by the FAP without passing through the FAC.

C.

In direct forwarding mode, after Layer 3 roaming is complete, traffic is sent to the HAC and then directly forwarded to the upper-layer network by default.

D.

In tunnel forwarding mode, after Layer 3 roaming is complete, traffic forwarded to the upper-layer network must pass through the HAC and then the HAP.

Huawei's SD-WAN Solution consists of several layers with different functions. What are theselayers?

A.

Control layer

B.

Network layer

C.

Management layer

D.

User layer

Which two network elements use the control channel to transmit information?

A.

CPE and CPE

B.

RR and CPE

C.

CPE and iMaster NCE

The FireHunter is a high-performance advanced persistent threat (APT) detection system developed by Huawei. In addition to traditional security detection technologies, the FireHunter sandbox also uses multi-engine virtualized detection technologies to collect and analyze the static and dynamic behavior of software. It also has a unique behavior pattern library technology for precisely identifying malicious files transmitted on networks and command-and-control (C&C) connections, preventing the spread of unknown threats.

A.

TRUE

B.

FALSE

Which of the following patterns can be used to identify and analyze connectivity issues using the clustering algorithms of iMaster NCE-CampusInsight?

A.

SSID

B.

Vendor

C.

User

D.

AC/AP

Which of the following are typical 802.1X authentication modes?

A.

EAP termination

B.

EAP relay

C.

EAP-MD5

D.

EAP-TLS