Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Huawei H35-211_V2.5 Dumps

Page: 1 / 12
Total 117 questions

HCIP-Access V2.5 Questions and Answers

Question 1

The protection scope of GPON Type B dual-homing protection covers ( ).

Options:

A.

Active and standby backbone optical fibers

B.

Active and standby OLTs

C.

Active and standby PON ports of the OLT

D.

Active and standby branch optical fibers

Question 2

(Radio) Follow the multicast IP address 227.120.1.32. The correct multicast MAC address corresponding to it is:

Options:

A.

01-00-5e-78-01-32

B.

01-00-5e-14-01-20

C.

01-00-5e-78-01-20

D.

01-00-5e-14-01-32

Question 3

(Single choice) The following statement about defending MAC Spoofing is wrong:

Options:

A.

MAC Anti-MAC-Spoofing features are mutually exclusive with WMAC, SC, PPPoE-SMAC features at the VLAN level

B.

After the Anti-MAC-Spoofing function is enabled, the system automatically implements dynamic binding of the MAC address to the service flow

C.

After enabling the Anti-MAC-Spoofing function, for IPoE users using fixed IP, the user needs to be statically configured

D.

Turning off the Anti-MAC-Spoofing function can only remove the fixed table items, which does not affect the user’s service application, but the service forwarding plane will be interrupted

Question 4

The complete SIP message interaction process contains multiple requests and responses. Which SIP header field is used to indicate which specific request a given response corresponds to?

Options:

A.

CSeq

B.

Call-ID

C.

First line

D.

Message body

Question 5

On a Layer 2 network, which protocol can be used to better control multicast traffic forwarding?

Options:

A.

PIM-DM

B.

HGMP

C.

IGMP-proxy

D.

PIM-SM

Question 6

(Single choice) The following statement about SSH connection is incorrect:

Options:

A.

SSH can be applied to secure remote login and encrypted file transfers over remote encrypted connections

B.

The SSH protocol encrypts all transmitted data, effectively preventing information leakage during remote management

C.

From a client perspective, SSH provides two levels of security authentication

D.

The SSH protocol works at the network layer

Question 7

If multicast services are deployed only on private networks, which multicast address segment is preferred?

Options:

A.

232.0.0.0/8

B.

239.0.0.0/8

C.

224.0.0.0/8

D.

225.0.0.0/8

Question 8

Which of the following statements about congestion avoidance is correct?

Options:

A.

When the number of packets exceeds the early drop threshold, packets are randomly dropped to avoid queue congestion without affecting services.

B.

Early drop and tail drop cannot coexist.

C.

Early drop indicates that packets are dropped before the number of packets reaches the preset threshold of packet numbers. This prevents queue congestion.

D.

The random drop probability in weighted early drop is related to the upper and lower thresholds.

Question 9

The priority of the packets at the egress port can be mapped or set directly. Which of the following statements about priority processing is correct?

Options:

A.

The priority policy must be tag-in-package regardless of the priority setting mode.

B.

The priority mapping can be set separately for the inner and outer priorities.

C.

The priority mapping needs to match the corresponding mapping profile. The mapping in a profile is fixed.

D.

Priorities of outbound and inbound packets are strictly mapped. An outer VLAN ID cannot be mapped to the priority of an inner VLAN ID.

Question 10

Under the H.248 protocol, if the signaling IP and media IP are both 10.1.1.100/8, and the voice gateway is 10.1.1.1, when configuring VoIP service, which command is incorrect?

Options:

A.

Using the command ip address media 10.1.1.100 10.1.1.1 in voip view to configure the media IP

B.

Use the reset coldstart command under the H.248 interface so interface property configuration takes effect

C.

Use the if-h248 attribute command to configure interface properties under the H.248 voice interface

D.

Using the command ip address signaling 10.1.1.100 10.1.1.1 in voip view to configure the signaling IP

Question 11

(Single choice) When planning QoS, it is necessary to plan reasonably according to the service, and adopt the () scheduling mode for high-priority services.

Options:

A.

WFQ

B.

RR

C.

DRR

D.

WRR

Question 12

Which of the following statements about the E2E ODN pre-connection solution are correct?

Options:

A.

Easy deployment, 100% splicing-free, no need for professional skills and tools, and improved efficiency

B.

Splitters are installed in pre-connected boxes and occupy small space.

C.

The pre-connection solution uses distributed optical splitting to reduce the number of drop cables, thereby reducing the number of pipes and cables.

D.

Easy to maintain, no need for fiber splicing, and low maintenance skill requirements

Question 13

(Single choice) The upstream wavelength of 10G-EPON is:

Options:

A.

1577 nm

B.

1270 nm (symmetric)

C.

1310 nm (asymmetric)

D.

1490 nm

Question 14

(Radio) In the ACL, if you need to filter packets by source IP, destination IP, and port number, the ACL number template to create is:

Options:

A.

5000–5999

B.

3000–3999

C.

2000–2999

D.

4000–4999

Question 15

(Single choice) The 10G GPON (XG-PON) system uses XGEM frames to encapsulate data. The Port-ID defined in the XGEM header is () bits.

Options:

A.

18

B.

12

C.

14

D.

16

Question 16

(Radio) The device periodically sends and receives LACP packets to avoid information loss. If no LACPDU is received within ( ) LACP interaction cycles, the system considers the member port Down.

Options:

A.

3

B.

5

C.

4

D.

2

Question 17

(Radio) The downstream effective bandwidth of a GPON PON port is:

Options:

A.

2 Gbit/s

B.

1.25 Gbit/s

C.

2.5 Gbit/s

D.

2.2 Gbit/s

Question 18

The solutions to MAC address spoofing include:

Options:

A.

Limit the number of user MAC addresses that can be learned.

B.

Replace a user terminal.

C.

Automatically bind MAC addresses.

D.

Manually configure a static MAC address.

Question 19

(Radio) A power access service deploys GPON Type C dual-attribution protection, and the protection group is bound to the uplink Ethernet-port status on the OLT. When the Ethernet port associated with the protection group on the OLT goes Down, the following description is incorrect.

Options:

A.

The state of the ONU-side work port changes to standby

B.

The OLT detects the ONU uplink state change

C.

After switchover, the ONU’s service is sent to the OLT through the protect port (service traffic follows the protect path)

D.

The ONU detects the link failure and triggers the protection switchover

Question 20

Which of the following statements about congestion avoidance is incorrect?

Options:

A.

To prevent high-priority packets from being discarded, the early drop threshold of high-priority packets is set to a smaller value.

B.

Congestion avoidance is a traffic control mechanism that monitors the usage of network resources (such as queues or memory buffers) and discards packets when the system is congested to adjust the traffic and mitigate network overload.

C.

The RED technology can reduce the jitter during packet transmission.

D.

Tail drop causes global TCP synchronization and reduces bandwidth usage.

Question 21

Which of the following protocols is used to manage multicast member relationships?

Options:

A.

PIM-DM

B.

IGMP

C.

MSDP

D.

PIM-SM

Question 22

In video services, if the VOD service is normal but the live service encounters a black screen, which of the following are possible causes?

Options:

A.

PQ is used for downstream congestion management of an OLT.

B.

DWRR is used for upstream congestion management of an OLT.

C.

On the ONU, the VLAN of the VoD service is different from that of the live service. On the OLT, there is only one video service stream.

D.

The traffic profile corresponding to the OLT upstream multicast service flow is set to a low priority.

Question 23

When ONT fails or the hardware needs to be replaced, the ONT needs to be removed on the OLT and then a new ONT needs to be registered.

Options:

A.

wrong

B.

Right

Question 24

Compared with Type C dual-homing protection, which of the following statements about Type C single-homing protection are correct?

Options:

A.

Protects important services such as enterprise and base station private line access services.

B.

When the OLT or uplink of the OLT is faulty, services can be switched to the other OLT.

C.

If the OLT is faulty, services are interrupted.

D.

The networking is simple, and the OLT and ONU management is simple.

Question 25

Layer 2 enables IGMP Snooping, and when the switch port receives an IGMP Join (Membership Report), it listens to the packet and adds the corresponding port to the multicast group.

Options:

A.

wrong

B.

Right

Question 26

(Single choice) The following statement about the PITP protocol is incorrect

Options:

A.

The PITP protocol includes PITP P mode and PITP V mode

B.

The purpose of the PITP feature is to provide the upper authentication server with the physical location information of the access user, and the BRAS device can realize the user account and the press position after obtaining the user access location information

C.

Bind the authentication of the information to avoid the theft and roaming of the user account

D.

In PITP V mode, the user's physical location information is added to the PPPoE message sent by the user side to cooperate with the upper-level server for user authentication

E.

PITP P mode can also be called PPPoE+ mode

Question 27

(Multiple choice) When the OLT main control board CPU is detected to be continuously high, the following are possible causes:

Options:

A.

The user logged in illegally

B.

Network loops

C.

Cyber attacks

D.

Rogue ONU

Question 28

(Radio) The following is not a QoS service model is

Options:

A.

DiffServ

B.

IntServ

C.

FIFO service

D.

Best Effort

Question 29

Deploying an Ethernet port protection group in the upstream direction of the OLT can improve the reliability and the bandwidth of the uplink.

Options:

A.

TRUE

B.

FALSE

Question 30

(Multiple choice) Which of the following measures can be adopted by GPON for traffic control?

Options:

A.

GEM-CAR

B.

GEM mapping

C.

Flow-CAR

D.

T-CONT-CAR

Question 31

(Multi-select) In U2000, adding a line template to map user traffic flows to GEM Ports supports which mapping modes?

Options:

A.

MAC

B.

PORT

C.

VLAN

D.

802.1p

Question 32

If the ONT zero touch provisioning function is enabled on the eSight, the OLT does not need to be preset during incremental configuration.

Options:

A.

TRUE

B.

FALSE

Question 33

In Layer 2 multicast, how many multicast IP addresses can a multicast MAC address correspond to?

Options:

A.

8

B.

16

C.

24

D.

32

Question 34

(Radio) Regarding multicast, the following description is incorrect:

Options:

A.

Add IGMP user under BTV; by default, multicast users can watch 8 programs.

B.

The user-issued IGMP Report is captured in the line board logic and sent to the line board CPU.

C.

Device-based global configurations of Layer 2 multicast refer to common parameters of protocols (IGMP Proxy, IGMP Snooping) for all.

D.

When the IGMP match mode is disabled, you need to configure the multicast program group.

Question 35

After anti-DoS attack is configured, the system periodically checks all user ports on the board. If the system detects attacks for multiple consecutive times, the system adds the corresponding port to the blacklist and waits for a random period before a new round of detection to determine whether to remove the port from the blacklist.

Options:

A.

TRUE

B.

FALSE

Page: 1 / 12
Total 117 questions