Huawei H35-211_V2.5 HCIP-Access V2.5 Exam Practice Test
HCIP-Access V2.5 Questions and Answers
Max-Forwards fields can be used in SIP messages to solve loop problems and avoid endless packet forwarding.
(Single choice) The upstream wavelength of 10G-EPON is:
After the anti-IP attack function is enabled on an OLT, the OLT cannot be remotely managed through Telnet.
In Huawei U2000, when adding network elements, you can only add them one-by-one while accessing each network element.
Type B protection provides redundant protection for both OLT PON ports and feeder (backbone) fibers. When the OLT PON port or feeder fiber fails, manually switch to the other optical path.
(Single-choice) An IPTV user reports the TV cannot be watched. After enabling OLT debug for multicast/IGMP, the printed information (authorization result) indicates the conclusion below. This can be judged by the results of the query:
(Radio) The 10G GPON system uses XGEM frames to encapsulate data, and the Port-ID is defined in the XGEM header as () bits.
The auto-discovery methods provided by eSight are network-segment mode, ARP mode, and routing mode. You can also create an exclusion list (network segments or specific IPs) so that self-discovery automatically skips them.
(Single) When deploying home and guest services in a PON system, which of the following services has the highest priority?
The protection scope of GPON Type B dual-homing protection covers ( ).
(Single choice) In GPON systems, in order to prevent network monitoring, the most common method is.
In a campus project, XGS-PON is used; ONUs backhaul APs via a 1:16 splitter, but only 12 APs are actually connected per splitter. What is the downstream concurrent bandwidth per AP (Mbit/s)?
(Radio) The upstream (ascending) wavelength of the 10G EPON system is:
Which of the following statements about the implementation of VLAN Layer 2 intercommunication through ARP proxy and VLAN service-profile is correct?
(Radio) The following is not a QoS service model is
If the ONT zero touch provisioning function is enabled on the eSight, the OLT does not need to be preset during incremental configuration.
The Class D multicast address range is from 224.0.0.0 to 238.255.255.255.
(Multiple choice) Which of the following measures can be adopted by GPON for traffic control?
If only one ONU connected to a PON port cannot be automatically discovered, the possible cause is that the hardware of the ONU is faulty.
(Single choice) The following statement about the PITP protocol is incorrect
After anti-DoS attack is configured, the system periodically checks all user ports on the board. If the system detects attacks for multiple consecutive times, the system adds the corresponding port to the blacklist and waits for a random period before a new round of detection to determine whether to remove the port from the blacklist.
In the evolution from EPON to 10G-EPON, a smooth transition is achieved at the central office by adding WDM modules, and ODNs can coexist/reuse.
Deploying an Ethernet port protection group in the upstream direction of the OLT can improve the reliability and the bandwidth of the uplink.
In eSight’s ONT zero-configuration (zero-touch) deployment, do not provision the OLT when incrementally configuring the OLT.
The maximum spectroscopic (split) ratio supported by 10G EPON is?
Which of the following statements about congestion avoidance is correct?
(Single-choice) HSI service uses VLAN tags to bind users precisely. If there are 5K FTTH users hanging under the OLT, which VLAN switching scheme is recommended?
Which of the following statements about multicast is incorrect?
On U2000, if an OLT PON port LED is not green, it indicates the PON port is faulty.
(Multi-select) eSight is network management software positioned for enterprise networks and can view ONT device details, including which of the following?
If multicast services are deployed only on private networks, which multicast address segment is preferred?
Before traffic scheduling, the OLT needs to classify service flows. Which of the following can be used for traffic classification?
For the packets from the client side, the flow matching is performed preferentially according to the VLAN tag carried in the packets. If the matching fails and the TLS service flow is deployed on the device, the packets are matched to the TLS service flow.
The establishment, maintenance, and teardown of the signaling path between a SIP user and servers are done through an exchange of a series of SIP messages. Therefore, every piece of information in a SIP message is unique and no header information value ever appears multiple times.
(Radio) When the INVITE message sent by user A reaches user B after passing through servers C, D, and E, the Via header field entries recorded in the message received by user B appear in which order (top to bottom)?