Practice Free H35-211_V2.5-ENU Exam Online Questions
When deploying GPON Type C single-homing protection, which of the following descriptions is correct?
- A . A branch fiber breaks and the OLT’s work port status changes to standby.
- B . The two ports protected by the OLT side cannot send or receive data at the same time
- C . When the OLT uplink fails, protection switching can be triggered
- D . The service configuration of ONU access is exactly the same as the configuration before protection.
Type In C protection mode, which of the following conditions will trigger automatic protection switching? (Multiple choice)
- A . ONU offline
- B . Input optical signal is lost
- C . ONU hardware failure
- D . OLT hardware failure
During the ONU forwarding process, the Layer 2 priority of the message is added based on the deployed policy. The user-side message received by the ONU has no priority.
- A . TRUE
- B . FALSE
Which of the following options may cause interruption of broadband services for the entire OLT? (Multiple choice)
- A . Service board failure
- B . Main control board failure
- C . Cyberattack
- D . Uplink board failure
When testing the key parameters of a 0 network, which of the following options is inappropriate?
- A . Return loss
- B . Reflection loss
- C . Fiber depth reduction
- D . ODN device insertion loss
Compared with PSTN network, what are the advantages of NGN network? (Multiple choice)
- A . Separation of return service and call
- B . Support voice, data, video and many other services at the same time
- C . Return to layered architecture
- D . Separation of control and connection
Which of the following statements about congestion avoidance is incorrect?
- A . Congestion avoidance is a flow control mechanism that monitors the usage of network resources (such as queues or memory buffers) and proactively drops packets when congestion occurs. This mechanism adjusts network traffic to relieve network overload.
- B . Tail drop causes TCP global synchronization and reduces bandwidth utilization.
- C . RED technology can reduce jitter during message transmission.
- D . To prevent high-priority packets from being discarded, the early discard threshold for high-priority packets is generally set lower.
Which of the following descriptions of network security vulnerabilities is correct?
- A . System failure caused by user’s misoperation
- B . Defects caused by decreased network hardware performance
- C . Errors that occur during network protocol operation
- D . Defects in the logical design of system software or application software
A user complained about slow download speeds. Which of the following reasons would not cause slow download speeds?
- A . The OLT upstream port traffic is too large
- B . The DBA template rate is too low
- C . OLT has unknown traffic occupying bandwidth
- D . The CAR template rate is configured too low
In the Huawei OLT system, which of the following message types are supported when implementing a DoS attack prevention message processing strategy? (Multiple choice)
- A . DHKP
- B . IGMP
- C . PPPOE
- D . FTP
