Certbus > Huawei > Huawei Certifications > H12-311 > H12-311 Online Practice Questions and Answers

H12-311 Online Practice Questions and Answers

Questions 4

Which modulation method does the following picture belong to?

A. amplitude modulation

B. frequency modulation

C. phase modulation

D. modulation

Browse 297 Q&As
Questions 5

What is the bandwidth of each channel in the 802.11g band?

A. 25 MHz

B. 20 MHz

C. 50 MHz

D. 22 MHz

Browse 297 Q&As
Questions 6

The basic service set is the basic component of an 802.11 network and consists of a set of workstations that communicate with each other.

A. True

B. False

Browse 297 Q&As
Questions 7

Huawei's AP products can only support one SSID.

A. True

B. False

Browse 297 Q&As
Questions 8

Which of the following protocols is defined in the Mesh networking?

A. 802.11a

B. 802.11g

C. 802.11e

D. 802.11s

Browse 297 Q&As
Questions 9

The modulation methods adopted by DSSS are BPSK and QPSK respectively.

A. True

B. False

Browse 297 Q&As
Questions 10

Which is the longest interval between 802.11 frames?

A. SIFS

B. IFS

C. DIFS

D. PIFS

Browse 297 Q&As
Questions 11

What is correct in the following options (Select 3 Answers)?

A. SSID technology can divide a wireless local area network into several sub-networks that require different authentication. Each sub-network needs independent authentication. Only authenticated users can enter the corresponding sub-network to prevent unauthorized access. The user enters the network.

B. The BSSID is actually the MAC address of the AP, which is used to identify the BSS managed by the AP, and maps the BSSID and SSID in the same AP.

C. Users can implement roaming under different SSIDs.

D. The SSID is the same in an ESS, but the BSSID corresponding to each AP in the ESS is different. If an AP can support multiple SSIDs at the same time, the AP will assign different BSSIDs to correspond to these SSIDs.

Browse 297 Q&As
Questions 12

Among the following encryption methods, the best security is.

A. Clear text encryption

B. WEP encryption

C. TKIP encryption

D. CCMP encryption

Browse 297 Q&As
Questions 13

The following is a description of TKIP encryption. The error is .

A. The length of the IV used in A. TKIP encryption is 24bits.

B. TKIP encryption uses the same encryption algorithm as WEP encryption.

C. The motivation for developing TKIP encryption is to upgrade the security of legacy WEP hardware.

D. Added the mechanism of key generation, management and delivery in TKIP encryption.

Browse 297 Q&As
Questions 14

The IEEE 802.11 standard used to define roaming is

A. IEEE 802.11c

B. IEEE 802.11h

C. IEEE 802.11j

D. IEEE 802.11r

Browse 297 Q&As
Questions 15

Among the following options, is the reason for using 5G priority access.

A. 5G frequency band is easier to network planning

B. 5G frequency band can provide better access capacity and capacity The connection speed between the user and the AP is fast in the

C. 5G frequency band. The transmission rate of the

D. 5G frequency band is higher than the 2.4G frequency band.

Browse 297 Q&As
Questions 16

Among the following obstacles, has the greatest loss of wireless signals.

A. Gypsum ceiling

B. Glass

C. 120mm Brick wall

D. 200mm Concrete wall

Browse 297 Q&As
Questions 17

For indoor distributed APs, the following description is correct (B).

A. AP power can be up to 800mW.

B. It can be deployed in conjunction with the carrier's 3G network.

C. Waterproof and dustproof

D. AP6310SN supports dual frequency mode

Browse 297 Q&As
Questions 18

The equipment manufacturer can usually be judged according to the following.

A. SSID

B. MAC address

C. Encryption type

D. Channel

Browse 297 Q&As
Exam Code: H12-311
Exam Name: HCIA-WLAN V3.0
Last Update: Mar 14, 2025
Questions: 297 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99