Practice Free H35-211_V2.5-ENU Exam Online Questions
After enabling ABS encryption in a GPON system, which device initiates the key change?
- A . RS.
- B . ONU
- C . OLT
- D . PC
VLAN planning principles need to be considered (). (Multiple choice)
- A . Total number of VLANs
- B . Customer types and number of users
- C . Business Types and Categories
- D . Uplink networking method
- E . OLT Network Topology
The DHCP Option 82 switch has four levels: global, port, service virtual terminal, and VLAN. This function can be achieved without having all levels fully enabled.
- A . True
- B . False
Which of the following descriptions about congestion avoidance is correct?
- A . Early discard and tail discard methods cannot coexist.
- B . Early discard refers to discarding reports before they reach a set threshold to avoid queue congestion.
- C . The random drop probability in weighted early drop is related to the values of the high and low thresholds.
- D . When the number of packets exceeds the early discard threshold, packets will be randomly discarded to avoid queue congestion without affecting business operations.
When configuring multicast services, the authentication method used when adding multicast users is no-auth. If 10 programs are configured on the OLT (and the upper-layer device can provide these programs), then how many programs can the multicast user watch?
- A . 08
- B . 04
- C . 10
- D . 0
Which of the following descriptions about encryption technology in GPOH systems is incorrect?
- A . OHU generates a key and sends it to OLT in two parts, repeating the process three times.
- B . The GPON system uses the AES-128 encryption algorithm to encrypt plaintext data packets.
- C . OLT generates an encryption key to encrypt data.
- D . The GPON system periodically performs AES key exchange and updates.
Which of the following statements about the characteristics of each layer of POL is reasonable? (Multiple choice)
- A . As an aggregation layer device, if two OLTs are configured, backup can be achieved by interconnecting the two OLTs.
- B . The access layer is located close to the information point, providing a wide variety of access methods, and is required to support VLAN and IGMP. It features snooping, ring avoidance, and security features such as 802.1x and port security.
- C . The aggregation layer requires strong forwarding capabilities, high port density, and high reliability.
- D . The aggregation layer supports "horizontal" traffic between users while also providing "vertical" traffic to the core layer.
Which of the following options is a RADIUS property?
- A . Use the same transport protocol as WTACACS.
- B . It possesses reliable transmission characteristics.
- C . The fields in the message that need to be encrypted can be adjusted according to user requirements.
- D . After a user is authenticated, the message content returned is different from WTACACS.
After enabling certain security features on an OLT, it was found that the forwarding of protocol messages for some services was affected. Which of the following options is NOT a possible cause? (Multiple choice)
- A . Anti-DoS is triggered and the handling strategy is deny.
- B . The anti-ipattack feature prevents protocol packets from being forwarded normally.
- C . For users on the firewall blacklist, the AC1 rule is matched, and the processing policy is permit.
- D . Sysman IP-access network segment mismatch.
A complete SIP message exchange process includes multiple request and response messages. A field in the SIP message header can be used to describe the specific request corresponding to the current response message. This field is ().
- A . Csea
- B . Call-ID
- C . First line
- D . Message Body
