Huawei H12-323_V2.0-ENU Übungsprüfungen
Zuletzt aktualisiert am 10.05.2025- Prüfungscode: H12-323_V2.0-ENU
- Prüfungsname: HCIP-WLAN V2.0
- Zertifizierungsanbieter: Huawei
- Zuletzt aktualisiert am: 10.05.2025
The AP calculator in CloudCampus APP integrates various scenarios and network construction standards. Which of the following scenarios is not included?
- A . Gaomi venues
- B . Hotel
- C . Mine
- D . Shopping mall
When using WLAN Planner to merge projects, both the baseline project and the related projects must have floors before the projects can be merged, otherwise the merger will fail.
- A . True
- B . False
CAPWAP protocol is an application layer protocol used for communication between WAC and FIT AP. Its TCP-based transmission mechanism can provide reliable data transmission, thereby improving the stability of WLAN network.
- A . True
- B . False
During the MAC authentication process, to prevent illegal users from brute-forcing the user name and password of the terminal, the silent function of MAC authentication can be enabled. By default, if a user fails to authenticate five times within 600 seconds, the access device will discard the user’s authentication request within the next 60 seconds.
- A . True
- B . False
An engineer is deploying a wireless network at a customer site. The customer requires the wireless controller to use dual-link hot standby networking. During the configuration process, the engineer found that dual links could not be established between the active and standby WACs. Which of the following situations may be the cause of this problem? (Multiple choice)
- A . When the AP selects WAC, the main WAC has not started normally
- B . The standby WAC IP address is not configured on the primary WAC or the configured IP address is inconsistent with the standby WAC IP address
- C . The IP address of protect-ac is not configured on the standby WAC
- D . The dual-link switch on the standby WAC is not turned on
During MAC authentication, to prevent illegal users from brute-forcing the user name and password of the terminal, the silent function of MAC authentication can be enabled. By default, if a user fails to authenticate 5 times within 60 seconds, the access device will discard the user’s authentication request within the next 60 seconds.
- A . True
- B . False
When an engineer is optimizing the network, in order to prevent non-critical services from occupying too much network resources, he configures the QoS function based on the application protocol. The specific configuration is as follows.
Which of the following descriptions of configuration is wrong?
- A . All apps in the specified app list discard FaceTime messages
- B . SkypeForBusiness’s DSCP priority is 40
- C . You can view user-based protocol statistics
- D . You can view protocol statistics based on VAP
Which of the following descriptions about the comparison between Mesh network and traditional LAN network (AP uplink uses wired network) are correct? (Multiple choice)
- A . Compared with traditional WLAN networks, Mesh networks are more flexible and APs can join or leave the network at any time as needed.
- B . Compared with traditional WLAN networks, Mesh networks have better anti-interference capabilities.
- C . Compared with traditional WLAN networks, the construction cost of Mesh networks is lower
- D . Compared with traditional WLAN networks, Mesh networks have larger bandwidth and lower data transmission delay.
The tool is used for site survey. The network card must be loaded before starting the site survey.
Which of the following statements about network card loading is correct? (Multiple choice)
- A . Before each site survey, the network card must be loaded
- B . After opening the tool, you only need to load the network card once
- C . After entering the tool for the first time, the network card must be loaded when starting the site survey
- D . After opening the tool to load the network card, the second time the network card is loaded, it will be automatically loaded, but there will be a gap in between.
During the STA access process, a link authentication phase is required. During this phase, which of the following security policies supports the shared key authentication mechanism?
- A . WAPI
- B . WFA3
- C . WEP
- D . WPA2