Which statement about Wireless Protected Access (WPA) is true?
Answer : C
Which PHY data-rate is provided by WLAN standard 802.11ac 4×4 wave 2?
Answer : C
Explanation:
Referencehttp://rrc.ru/upload/avaya/ethernet/WLAN_9100_Tech_Transfer(May2016).pptx
Answer : C,D,E
Which three classes of surveys can Wi-Fi Designer perform? (Choose three.)
Answer : B,C,E
Explanation:
Referencehttps://forums.networkinfrastructure.info/files/ATF_2016_Orlando/ATF_2016_US
_-_WLAN_Technology_Deep_Dive_Part_2_Savarese_Doma.pdf(p.25)
A customer is implementing a BYOD strategy, and allows employees to use smartphones, tablets, and privately owned computers to connect to the corporate network. To ensure this does not impact productivity, they want to restrict network access for non-professional application and websites.
To meet the customer requirement, which functionality of WLAN 9100 should be implemented?
Answer : E
To protect WLAN Access Point from external security threats and seamless roaming operations, which two protocols can be implemented in Avaya Access Points? (Choose two.)
Answer : A,B
In Identity Engines, where are PEAP/EAP-MSCHAPv2 Authentication mechanisms configured?
Answer : D
Explanation:
Referencehttps://downloads.avaya.com/css/P8/documents/100179194(P.60)
Which pre-configured WAP feature is used to eliminate unnecessary wireless traffic, resulting in improved performance on Access Points?
Answer : D
Explanation:
Referencehttps://forums.networkinfrastructure.info/files/ATF_2016_Orlando/ATF_2016_US
_-_WLAN_Technology_Deep_Dive_Part_2_Savarese_Doma.pdf(P.75)
When an FA Client is discovered and is attached to the port, which method should be followed to enable the switch to automatically configured a port to the required mode?
Answer : D
Explanation:
Referencehttps://downloads.avaya.com/css/P8/documents/101016706
When an FA Client is discovered and is attached to the port, which command enables the
Edge switch to automatically configure a port to the required mode?
Answer : D
Explanation:
Referenceftp://srv01.marubeni-
sys.com/other/network1/Avaya/ERS4800/V5.9.0/Document/NN47205-
507_03_03_Configuring_Fabric_Connect.pdf(p.90)
What is the main Authentication/Authorization component within the Avaya Identity Engines solution?
Answer : B
Explanation:
Referencehttps://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja
&uact=8&ved=0ahUKEwj17an-kY7VAhWCmJQKHV-
iAJYQFggnMAA&url=https%3A%2F%2Fwww.avaya.com%2Fen%2Fdocuments%2Favayai dentityenginesportfoliodn5115.pdf&usg=AFQjCNFTmUzfXTZ4I299ZplwHu8KA0iTnw(p.2)
In which file format does Avaya provide the Identity Engines Ignition Server, Ignition Guest
Manager, and Ignition Access Portal as Virtual Appliances?
Answer : B
Explanation:
Referencehttps://downloads.avaya.com/css/P8/documents/101008754
What are three best practices for WLAN 9100 deployments? (Choose three.)
Answer : B,C,E
Explanation:
Referencehttps://forums.networkinfrastructure.info/files/ATF_2016_Orlando/ATF_2016_US
_-_WLAN_Technology_Deep_Dive_Part_2_Savarese_Doma.pdf
Which two statements about WLAN 9100 Internal RADIUS server are true? (Choose two.)
Answer : C,D