HCIP-Access V2.5 Questions and Answers
The protection scope of GPON Type B dual-homing protection covers ( ).
(Radio) Follow the multicast IP address 227.120.1.32. The correct multicast MAC address corresponding to it is:
(Single choice) The following statement about defending MAC Spoofing is wrong:
The complete SIP message interaction process contains multiple requests and responses. Which SIP header field is used to indicate which specific request a given response corresponds to?
On a Layer 2 network, which protocol can be used to better control multicast traffic forwarding?
(Single choice) The following statement about SSH connection is incorrect:
If multicast services are deployed only on private networks, which multicast address segment is preferred?
Which of the following statements about congestion avoidance is correct?
The priority of the packets at the egress port can be mapped or set directly. Which of the following statements about priority processing is correct?
Under the H.248 protocol, if the signaling IP and media IP are both 10.1.1.100/8, and the voice gateway is 10.1.1.1, when configuring VoIP service, which command is incorrect?
(Single choice) When planning QoS, it is necessary to plan reasonably according to the service, and adopt the () scheduling mode for high-priority services.
Which of the following statements about the E2E ODN pre-connection solution are correct?
(Single choice) The upstream wavelength of 10G-EPON is:
(Radio) In the ACL, if you need to filter packets by source IP, destination IP, and port number, the ACL number template to create is:
(Single choice) The 10G GPON (XG-PON) system uses XGEM frames to encapsulate data. The Port-ID defined in the XGEM header is () bits.
(Radio) The device periodically sends and receives LACP packets to avoid information loss. If no LACPDU is received within ( ) LACP interaction cycles, the system considers the member port Down.
(Radio) The downstream effective bandwidth of a GPON PON port is:
The solutions to MAC address spoofing include:
(Radio) A power access service deploys GPON Type C dual-attribution protection, and the protection group is bound to the uplink Ethernet-port status on the OLT. When the Ethernet port associated with the protection group on the OLT goes Down, the following description is incorrect.
Which of the following statements about congestion avoidance is incorrect?
Which of the following protocols is used to manage multicast member relationships?
In video services, if the VOD service is normal but the live service encounters a black screen, which of the following are possible causes?
When ONT fails or the hardware needs to be replaced, the ONT needs to be removed on the OLT and then a new ONT needs to be registered.
Compared with Type C dual-homing protection, which of the following statements about Type C single-homing protection are correct?
Layer 2 enables IGMP Snooping, and when the switch port receives an IGMP Join (Membership Report), it listens to the packet and adds the corresponding port to the multicast group.
(Single choice) The following statement about the PITP protocol is incorrect
(Multiple choice) When the OLT main control board CPU is detected to be continuously high, the following are possible causes:
(Radio) The following is not a QoS service model is
Deploying an Ethernet port protection group in the upstream direction of the OLT can improve the reliability and the bandwidth of the uplink.
(Multiple choice) Which of the following measures can be adopted by GPON for traffic control?
(Multi-select) In U2000, adding a line template to map user traffic flows to GEM Ports supports which mapping modes?
If the ONT zero touch provisioning function is enabled on the eSight, the OLT does not need to be preset during incremental configuration.
In Layer 2 multicast, how many multicast IP addresses can a multicast MAC address correspond to?
(Radio) Regarding multicast, the following description is incorrect:
After anti-DoS attack is configured, the system periodically checks all user ports on the board. If the system detects attacks for multiple consecutive times, the system adds the corresponding port to the blacklist and waits for a random period before a new round of detection to determine whether to remove the port from the blacklist.