Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following statements about VXLAN is false?

A.

A Layer 2 VXLAN gateway forwards traffic to a VXLAN network and can also be used for Intra-subnet communication on the same VXLAN network.

B.

Layer 2 and Layer 3 VXLAN gateways must maintain VBDIF interfaces. Otherwise, users cannot communicate with each other through these interfaces.

C.

A VBDIF interface is a logical interface created based on a BD. It is similar to a VLANIF interface on a traditional network.

D.

A Layer 3 VXLAN gateway is used for inter-subnet communication on a VXLAN network and communication with external non-VXLAN networks.

Which of the following may be the reason why no data Is displayed on the telemetry management page of IMaster NCE-CampusInsight? (Select All that Apply)

A.

The network connecting devices and iMaster NCE-Campuslnsight Is faulty.

B.

Telemetry data reporting is not configured on devices according to the configuration guide.

C.

No license file is imported.

D.

Devices are not added to iMaster NCE-Campuslnsight.

E.

The UTC time of devices is inconsistent with that of iMaster NCE-Campuslnsight.

After the HTTP domain name is entered in a browser, the user Is not redirected to the Portal URL. Which of the followings is the possible cause for this failure? (Select All that Apply)

A.

The DNS server IP address is not added to the authentication-free rule.

B.

The URL template is incorrectly configured.

C.

HTTPS redirection is disabled.

D.

The web server is incorrectly configured.

802. 11r fast roaming (over-the-air) is enabled on the WLAN shown in the figure. A STA roams from AP1 to AP2. Sort the steps in chronological order during the 802.11r fast roaming process between WACs.

Which of the following statements about attack defense is true?

A.

Defense against flood attacks can be used to defend against Ping of Death attacks.

B.

Attack defense allows APs to analyze the contents and behaviors of incoming packets on ports to determine whether packets have attack characteristics. The APs then take defense measures on the packets that have attack characteristics.

C.

Attack defense can defend against spoofing packet attacks, malformed packet attacks, fragmentation attacks, and flood attacks.

D.

Fragmentation attack defense enables a device to detect packet fragments in real time and discard or rate-limit them to protect the device.

Which of the following statements are true about data collection of IMaster NCE-Campuslnslght? (Select All that Apply)

A.

iMaster NCE-Campuslnsight uses telemetry to Implement efficient data collection.

B.

Calculated data can be displayed on iMaster NCE-Campuslnsight only after a license Is loaded on the device management page.

C.

To collect data from WLAN devices, ensure that WACs can communicate with the southbound IP address of iMaster NCE-Campuslnsight. APs do not need to communicate with the southbound IP address of iMaster NCE-Campuslnsight.

D.

The UTC time of iMaster NCE-Campuslnsight must be the same as that of its managed devices.

Satellite positioning can achieve high positioning accuracy in both indoor and outdoor scenarios.

A.

True

B.

False

Which of the fallowings is not an IPv6 address type?

A.

Multicast address

B.

Unicast address

C.

Broadcast address

D.

Anycast address

An AP may preferentially use the BTM mode to steer some STAs. With which of the following protocols are such STAs compliant?

A.

802.11k

B.

802.11i

C.

802.11r

D.

802.11v

Which of the following key factors is used by the CloudCampus cloud management platform to determine the tenant to which a device belongs?

A.

Device ESN

B.

Device IP address

C.

Device MAC address

D.

Device model