Wireless NICs that only support TKIP can be upgraded via drivers to support AES encryption.
A. True
B. False
In the 802.1X protocol, you must have the ability to authenticate and authorize users (Select 3 Answers).
A. eSight server
B. client
C. certifier
D. authentication server
For the AC6605, the following commands can be used to check whether the AP is online.
A. display ap online all
B. display ap all
C. display ap-type all
D. dispay ap-run-info all
The following statement is correct (Select 3 Answers).
A. WPA2 PSK authentication requires the user to enter a username and password to connect
B. When the user obtains the IP address successfully, the user triggers the HTTP packet of the user. At this time, the user is forced to redirect to the portal server to perform the authentication process.
C. WPA2 uses 802.1X authentication
D. WAPI is China's wireless LAN national standard system
CCMP encryption is more secure than TKIP encryption because of its security.
A. Adopt a longer IV
B. Added a key distribution mechanism, no longer using a single key
C. Adopting a more complex encryption algorithm
D. Added a message integrity check mechanism
Configure the security profile of the wireless network as WEP. You need to configure the security profile on the AC6605 as follows.
A. security-policy wep Wep authentication-method open Wep key wep-40 hex 0 1234567890 Wep default-key 0
B. security-policy wep Policy wep share-key Wep key wep-40 hex 0 1234567890 Wep default-key 0
C. authentication policy wpa Wpa authentication-method share-key Wpa key wpa-40 hex 0 1234567890 Wpa default-key 0
D. authentication policy wpa2 Wpa2 authentication-method share-key Wpa2 key wpa2-40 hex 0 1234567890 Wpa2 default-key 0
For shared key authentication, the following description is wrong.
A. After using shared key authentication, WEP encryption must be used.
B. Shared key requires the user and AP to use the same shared key
C. For thin APs, the shared key is preset in the AC.
D. The disadvantage of shared key is that it is not scalable and not very secure.
Which of the following ports can only belong to one VLAN.
A. access
B. hybrid
C. trunk
D. eth-trunk
In the TKIP encryption mode, the length of the IV vector is bit.
A. 12
B. 24
C. 48
D. 64
The algorithm used for CCMP encryption is .
A. RC4
B. AES
C. SMS4
D. Michael
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Huawei exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your H12-311 exam preparations and Huawei certification application, do not hesitate to visit our Vcedump.com to find your solutions here.