Which of the following cannot be monitored by the controller?
The iMaster NCE-Campus controller monitors the network via protocols like SNMP, NETCONF, and Telemetry to provide visibility into application traffic (A), topology (B), and link stats (D). However, original/raw NetStream flow information (C) is typically too voluminous for a management controller to process. Instead, these raw packets are sent to a dedicated Analyzer (like iMaster NCE-CampusInsight) which performs deep data mining. The controller only receives summarized reports or metadata from the analyzer.
Which of the following authentication modes are used for user access on a campus network?
In Huawei's Xinghe Intelligent Campus solution, user access control is handled through three primary methods: 802.1X (B) for high-security enterprise environments, Portal (A) for flexible guest and web-based access, and MAC address authentication (C) for IoT devices like printers and IP cameras that lack a user interface. OSPF authentication (D) is a routing security feature used to verify the identity of neighboring routers, not an end-user access authentication method.
What is the single-link failover time supported by Huawei's M-LAG solution?
M-LAG (Multichassis Link Aggregation Group) is a key reliability technology in the Huawei Xinghe Intelligent Campus architecture. It provides device-level redundancy by virtualizing two switches into a single logical entity. One of the primary performance requirements for M-LAG in high-availability designs is ensuring millisecond-level failover. In the event of a single link failure (e.g., an uplink from an access switch to one of the M-LAG core switches), the traffic is rerouted through the peer-link or the remaining active member of the Eth-Trunk in less than 50 ms, ensuring 'hitless' service for sensitive applications like voice or industrial control.
What types of attack detection are supported over the air interface?
Huawei's WIDS (Wireless Intrusion Detection System) and WIPS (Wireless Intrusion Prevention System) provide comprehensive air interface protection. They are designed to detect:
Flood attacks (A): Detecting an abnormal volume of management frames (like Auth/Deauth floods).
Spoofing attacks (B): Detecting unauthorized APs or STAs using the MAC addresses of authorized devices.
Weak IV attacks (C): Detecting attempts to exploit older encryption (like WEP) by identifying weak Initialization Vectors.
Brute force cracking (D): Monitoring for repeated authentication failures that indicate an attempt to guess WPA/WPA2-PSK or WAPI-PSK keys.
Which of the following components in Huawei's ESN-free deployment solution generates the SiteCode?
In the Xinghe Intelligent Campus ESN-free deployment (aimed at simplifying logistics where the Serial Number/ESN isn't known beforehand), the iMaster NCE-Campus (D) platform generates a unique SiteCode. This SiteCode is provided to the installation personnel, who then enter it into the deployment app or the device's local web UI. Once the device connects to the internet, it reports the SiteCode to the platform, which then automatically binds the device's ESN to the correct site configuration.
Currently there are no comments in this discussion, be the first to comment!
Currently there are no comments in this discussion, be the first to comment!