Practice Free H35-211_V2.5-ENU Exam Online Questions
In a GPON system, when Type B protection is enabled, which of the following situations will trigger protection switching? (Multiple choice)
- A . OLT power failure
- B . PON board failure
LOS alarm detected - C . ONT power failure
Which of the following statements about defending against MAC Spoofing is incorrect?
- A . After enabling the anti-MAC Spoofing function, the system will automatically realize the dynamic mapping of AC addresses and service flows.
- B . MAC Anti-MAC Spoofing and WAC, S+C, and PPPOE SMAC VLA and Mutual Exclusivity
- C . After enabling the Anti-MAC Spoofing function, for IPE users with fixed IP addresses, you need to statically configure the user
- D . Disable the Anti-MAC Spoofing function. The only action involved is to delete the specified table entry. It will not affect user business applications, but the business interface will be interrupted.
When using Type B home networking, the mainstream application scenarios are (). (Multiple choice)
- A . The OLT upstream L3 core switch runs RRP, and MSP runs between the L dual stirrups and L3.
- B . The L3 core switch for OLT upstream adopts clustering, and the L3 dual links are connected to the core switch, and the links adopt link aggregation.
- C . The upstream L3 core switch of OLT runs VRRP, OLT single homing, networking
- D . The OLT upstream L3 Eucalyptus core switch cluster has the active and standby L connected to the core switch respectively, and the active and standby OLT uplinks are not configured with aggregation as a whole.
SIP users and servers establish, maintain, and tear down a voice channel through a series of message interactions. Therefore, every piece of information contained in a SIP message is unique, and a single information value will not appear multiple times.
- A . True
- B . False
The 10G GPON system uses XGEN frames to encapsulate data, and the PORT ID is defined as () bits in the XGEN header.
- A . 18
- B . 12
- C . 14
- D . 16
Which of the following options is not a functional entity in the 802.1x security system?
- A . Agent System
- B . Authentication System
- C . Authentication Server System
- D . Requester System
Type In protection mode C, which switching type is not supported?
- A . Manual switching
- B . Automatic switching
- C . Semi-automatic reversing
- D . Forced switching
When logging into the OLT remotely, to ensure a secure connection, which of the following options are correct? (Multiple choice)
- A . Log in using telnet
- B . Log in using SNMP V2
- C . Log in using SSH
- D . Log in using SNMP V3
In Huawei’s GPON system, which of the following methods are used to handle rogue ONUs with persistent light transmission? (Multiple choice)
- A . Detection
- B . Troubleshooting
- C . Isolation
- D . Disconnection
In the Ethernet port protection group, the data sending and receiving functions of the working port are turned on, and there is business transmission on the link, while the protection port can only receive but not send, and there is no business transmission on the link.
- A . TRUE
- B . FALSE
