相关试题
【多选题】
SAE-GW要求能够接入以下哪些网络?()
A. WiFi
B. CDMA
C. LTE
D. WiMAX
【多选题】
NB-IoT系统中,NPSS的发送周期是()。
A. 10ms
B. 5ms
C. 1ms
D. 20ms
【多选题】
NPDCCH采用()调制方式。
A. 16QAM
B. QPSK
C. BPSK
D. 64QAM
【多选题】
在NB-IoT中,触发异常释放导致掉线的机制有()。
A. eNB/MME内部异常
B. eNB/MME侧资源拥塞
C. 空口重同步失败
D. 空口RLC达到最大重传次数(包括上行/下行)
【多选题】
下面哪项不是物联网的关键特征?()
A. 智能处理
B. 可靠传递
C. 全面感知
D. 高速运行
【多选题】
In-band模式下,对于5M的LTE系统带宽,频域上可用于NB-IOT的PRB有()个。
【多选题】
LTE中的同步信号与NB-IOT中同步信号差异有()。
A. LTE中PSS序列有3条,而NB-IOT中PSS序列仅有1条
B. LTE中PSS时域上占用一个OFDM符号,NB-IOT中NPSS时域上也占用1个OFDM符号
C. LTE中SSS和NB-IOT中NSSS的周期不同
D. LTE中PSS的周期为5ms,而NB-IOT中NPSS的周期为10ms
【多选题】
UE如果在slotn收到timingadvanccommand,那么应该在什么时刻调整它的上行传输timing?()
A. slotn+6
B. slotn+4
C. slotn+2
D. slotn+8
【多选题】
以下属于5G网元SMF的功能是()。
A. 会话管理
B. 下行链路数据到达的通知
C. UEIP地址分配,管理
D. 认证,授权
【多选题】
以下哪种SSB必须在SSraster上()。
A. 用于PScell接入的SSB
B. 用于NRScell接入的SSB
C. 用于NRPcell接入的SSB
D. 用于测量的SSB
【多选题】
关于5GRLM下面描述正确的是()。
A. 所有资源都比Q_out差,就上报OOS
B. 至少有一个资源比Q_in好,就上报IS
C. 至少有一个资源比Q_out好,就上报IS
D. 所有资源都比Q_in差,就上报OOS
【多选题】
划分SUL频段的意义是:()
A. 与3.5GHz搭配使用,补充上行覆盖范围
B. 增大下行数据传输速率
C. 增大上行数据传输速率
D. 与5GHz搭配使用,补充下行覆盖范围
【多选题】
5G网络规划与2/3/4G相比存在很大不同,主要面临的挑战有()。
A. 新业务的挑战
B. 新空口的挑战
C. 新频谱的挑战
D. 新架构的挑战
【多选题】
CDMA手机在空闲状态时,基站通过()信道给手机发送消息。
A. AccessChannel(接入信道)
B. SyncChannel(同步信道)
C. PilotChannel(导频信道)
D. PagingChannel(寻呼信道)
【多选题】
CDMA系统中,切换失败的原因包括()。
A. 恢复到原信道失败
B. 目标小区导频覆盖和业务信道覆盖不一致
C. 切换过程超时
D. 目标小区资源不可用
E. 声码器速率不匹配
F. 制定小区不存在
【多选题】
导频污染会严重影响移动台对()信号的解调,常常引起掉话。
A. 上行和下行
B. 下行
C. 上行
D. 不影响
【多选题】
CDMA手机是通过接收()信道消息来获得长码状态,系统时间等消息。
【多选题】
在反向链路上,CDMA2000系统是如何区分不同的用户的?()
A. 用长PN偏移量区分不同的用户
B. 用短PN偏移量区分不同的用户
C. 用Walsh码区分不同的用户
D. 用时隙区分不同的用户
【多选题】
CDMA系统中的哪项关键技术是对抗多径效应的有效技术?()
A. 功率控制
B. 软切换
C. 空间分集
D. 扩频通信
【多选题】
室内覆盖的主要作用是()。
A. 吸收话务,增加网络容量
B. 以上三者都是
C. 网络优化,接入系统降低系统干扰
D. 信号补盲,优化网络覆盖
【多选题】
以下属于私网地址段的有()。
A. 10.10.1.0/24
B. 192.88.99.0/24
C. 127.0.0.1/32
D. 192.168.10.0/24
【多选题】
在对一个网络进行故障检测时,在同一个网络中ping另外一台主机,在该主机接收到ping请求后,会返回以下哪种类型的包?()
A. ICMP响应请求
B. ICMP端口不可达
C. ICMP主机不可达
D. ICMP响应应答
【多选题】
对于调制和信道编码技术,下列哪些说法是正确的?()
A. 在同样的信道传输条件下,信道编码中加入的冗余码越多,信源的传输可靠性就越高
B. 8PSK调制信号比BPSK调制信号具有更好的带宽特性,但功率效率却较低。
C. 在同样的信道传输条件下,对同一信源进行信道编码时,采用1/2编码率的卷积编码比采用1/3编码率的卷积编码具有更高的传输可靠性
D. 在数据通信系统的设计中,调制方式的选择仅考虑带宽效率,对功率效率并不关心
【多选题】
若天馈线的驻波比是1.2,对应的回波损耗是()dB。
【多选题】
天线增益一般常用dBd和dBi两种单位,0dBd=()dBi。
A. 2.15
B. 6
C. 12.15
D. 3
【多选题】
MIB的内容有()
A. 系统帧号
B. 系统带宽
C. PHICHP配置
【多选题】
与业务无关RRC连接建立包括()
A. 紧急呼叫
B. RRC重建
C. 系统间小区重选
D. 注册
【多选题】
LTE网络,整个数据传输过程与()等因素相关。
A. 终端能力
B. 网元间配合
C. 无线网络质量
D. 有线传输带宽
【多选题】
初始附着时eNB收到UE随机接入请求消息会建立()
A. SRB0
B. DRB
C. SRB1
D. SRB2
【多选题】
在扫频仪的MIM0测试中,测量参数CN是的意思是:()。
A. 载波数量
B. 信道相关性
C. 呼叫网络
D. 捕获节点
【多选题】
NB-IoT中NSSS的发送周期为()。
A. 2ms
B. 640ms
C. 10ms
D. 20ms
【多选题】
NB-IoT网络与GSM网络相比,有哪些特性?()
A. 速率高
B. 时延小
C. 速率低
D. 时延大
【多选题】
NB-IoT系统中存在以下哪些上行物理信道和信号?()
A. NPUSCH
B. DmRS
C. NPUCCH
D. SRS
【多选题】
下面哪项是非授权频谱的通信技术?()
A. GSM
B. LTE
C. CDMA
D. LoRa
【多选题】
NB-IoT系统中,rrcconnectionresumerequest的回复信令可能是()
A. rrcconnectionresume
B. rrcconnectionrelease
C. rrcconnectionsetup
D. rrcconnectionreject
【多选题】
NB-IoT系统中,NPUSCHformat1对应的RU包含的子载波数目可能为().
【多选题】
以下不属于5G关键性能指标的是()。
A. 1ms端到端时延
B. 2ms端到端时延
C. 连接速度10gbps
D. 100万连接每平方公里
【多选题】
5G典型业务有()。
A. 虚拟现实
B. 车联网
C. 移动在线游戏
D. 视频监控
【多选题】
5G网络关键技术MassiveMIMO的优势包括()。
A. 系统容量和能量效率大幅度提升
B. 信道的统计特性趋于稳定
C. 上行和下行发射能量都将减少
D. 用户间信道正交,干扰和噪声将被消除
【多选题】
PUCCH支持多种格式,以下哪几种格式支持4~14个OFDM符号?()
A. Format1
B. Format3
C. Format4
D. Format0
E. Format2
推荐试题
【单选题】
Which statement about zone-based firewall configuration is true?___
A. You can assign an interface to more than one zone
B. Traffic is implicitly denied by de fault between interfaces in the same zone
C. The zone must be configured before it can be a ssigned
D. Traffic that is destined to or sourced from the Self zone is de nied by default
【单选题】
Refer to the exhibit line in this configuration prevents the help Desk user from modifying the interface configuration.___
A. Privilege exec level 10 interface
B. Privilege exec level 9 configure terminal
C. Privilege exec level 7 show start-up
D. Username HelpDesk privilege 6 password help
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond