【多选题】
LTEVoice的Qos控制流程与以下哪个网元无关( )
A. PCRF
B. PGW
C. P-CSCF
D. SCCAS
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
EPC中的附着流程涉及哪些网元?( )
A. HSS
B. SGW
C. PGW
D. MME
【多选题】
RF优化的主要工作内容( )
A. 优化无线信号覆盖
B. 切换问题优化
C. 优化无线信号质量
【多选题】
下列选项哪个是UE等待切换成功的定时器?( )
A. T301;
B. T302;
C. T304
D. T300;
【多选题】
LTE路测指标中的掉线率指标表述不正确的是:( )。
A. 掉线指:在终端正常进行数据传送过程中数据传送发生异常中断,包括RRC连接异常中断,或数据速率降为0并持续5秒。
B. 掉线率指业务进行过程中发生业务异常中断的概率,即异常中断的次数与总业务进行次数之比。
C. 掉线是指在手机没主发Disconnect信令或没收到网络下发Disconnect/Release信令情况下,手机回到idle状态,则视为一次掉话。
D. 掉线率=掉线次数/成功完成连接建立次数
【多选题】
NPDSCH 传输模式至多支持( )天线端口。
【多选题】
NB-IoT终端支持( )和( )两种低功耗工作模式。
A. eDRX
B. GPS
C. DBS
D. PSM
【多选题】
NB-IoT基于竞争的随机接入过程中,UE如何获取NPRACH的信息( )。
A. 监听SIB2-NB获取NPRACH资源信息
B. 通过preamble获取
C. 通过eNB随机下发
【多选题】
NB-IoT中NPSS在每个无线帧的第几个子帧上发送?( )
【多选题】
可以采用BPSK调制方式的信道有( )。
A. NPUCCH
B. NPUSCH
C. NPHICH
D. NPRACH
【多选题】
CSI传输中出现冲突,哪类CSI的优先级最高?( )
A. PUSCH信道上传输的semi-persistent?CSI?reports
B. PUCCH信道上传输的semi-persistent?CSI?reports
C. PUCCH信道上传输的periodic?CSI?reports
D. PUSCH信道上传输的aperiodic?CSI?reports
【多选题】
MCG failure的触发原因有哪几种?( )
A. upon T312expiry
B. uponrandom access problem indication from MCG MAC while neither T300, T301, T304nor T311 is running
C. uponindication from MCG RLC that the maximum number of retransmissions has beenreached for an SRB or DRB
D. upon T310expiry?
【多选题】
在3GPP Rel-15的第一版本所定义的2种频率范围中,工作频段小于1GHz时支持的子载波间隔是( )。
A. 30KHz
B. 60KHz
C. 120KHz
D. 15KHz
【多选题】
5G NR中SSB组成( )。
A. SSS
B. PBCH
C. CSI-RS
D. PSS
【多选题】
CDMA系统使用( )来区分不同的基站及同一基站的不同扇区。
A. PN码
B. 时隙
C. Walsh码
D. 频率
【多选题】
CDMA的两个基本技术是:( )
A. 码分技术
B. 多址技术
C. 扩频技术
D. 功控技术
【多选题】
CDMA2000 1X系统中Origination Message消息通过( )信道传送。
A. 反向业务
B. 反向接入
C. 寻呼
D. 前向业务
【多选题】
使用光纤直放站做信源时,一般情况下光纤长度不能超过( ),光纤损耗不能超过 ( )。
A. 15Km; 7.5dB
B. 15Km ;5.5dB
C. 10Km; 5.7dB
D. 20Km; 7.5dB
【多选题】
以下哪点不是射频直放站的应用特点( )。
A. 无需与施主基站之间的传输资源
B. 一般情况下业务天线可以使用全向天线
C. 施主天线与业务天线之间有隔离度的要求
D. 对施主信号要求较高
【多选题】
直放站具有以下哪些作用( )
A. 转发基站信号,扩大基站覆盖范围
B. 改善接收信号质量,提高基站信号的信噪比
C. 盲区覆盖,改善现有网络的覆盖质量
D. 话务分流
【多选题】
下列等式哪些是正确的?( )。
A. 10dBm + 10dBm = 20dBm
B. 10dBm+10dB=20dBm
C. 10dBm + 10dBm = 13dBm
D. 10dBm+10dB=100dBm
【多选题】
关于天线增益,下列说法错误的是( )。
A. 可以用dBi 为单位来表示
B. 天线的增益越高,接收到的信号越强
C. 可以用dBd 为单位来表示
D. 表征天线将信号放大的能力
【多选题】
RRC连接建立时,控制面组建RrcConnectionSetup消息发给UE,正常情况下UE将回复什么消息?( )
A. RrcConnectionComplete;
B. DrmServiceResqult;
C. RrcConnectionSetupComplete;
D. SetupRequestMsg
【多选题】
在随机接入流程中,哪条消息是用来解决竞争的?( )
A. Msgl
B. Msg3
C. Msg2
D. Msg4
【多选题】
LTE的UE设定为A3事件触发同频切换,则( )增大时,可以减少A3事件的触发。
A. eventA3Offset
B. cellIndividualOffset_n
C. hysteresis
D. cellIndividualOffset_s
【多选题】
现语音或视频业务需要 UE 同时建立三个数据承载外,还需要 UE 建立 RRC链接信令承( )
A. SRB1
B. SRB3
C. SRB2
D. SRB4
【多选题】
RRC的主要功能包括:( )。
A. 准入控制
B. 小区重选
C. 测量报告
D. 无线资源管理
【多选题】
切换增益与下列哪些因素有关?( )
A. handoff hysteresis thresholds
B. coverage probability targets
C. connection delays
D. shadowing standard deviations
【多选题】
NB-IoT垂直应用领域的部署成本包含( )。
A. 硬件成本
B. 安装成本
C. 网络成本
D. 服务成本
【多选题】
NB-IoT技术对于终端的功耗目标是:( )。
A. 基于AA(5000mAh)电池,使用寿命可超过10年
B. 基于AA(3000mAh)电池,使用寿命可超过10年
C. 基于AA(5000mAh)电池,使用寿命可超过20年
D. 基于AA(3000mAh)电池,使用寿命可超过20年
【多选题】
5G支持的业务有( )。
A. 4K/8K/3D高清视频
B. 增强现实AR
C. 虚拟现实VR
D. 自动驾驶
【多选题】
5G无线接入的关键技术主要包含( )。
A. 终端直连
B. 超密集组网(UDN)
C. 全频谱接入
D. 大规模天线阵列
E. 新型多址
F. 新型多载波
【多选题】
3GPP对5G定义了三大场景:( ),( )和( )。
A. eMBB
B. ETC
C. mMTC
D. URLLC
【多选题】
未来的车联网不仅包括车与网络之间的远程通信,还包括车车,车路,车人的频繁交互的短程通信,这些短程通信统称为?( )
A. V2A
B. V2E
C. V2N
D. V2X
【多选题】
毫米波的典型站距是( )。
A. 5~40米
B. 200~1000米
C. 40~200米
D. 1000~5000米
【多选题】
在CDMA系统中,假设Initial Power = 0dB,Nom power = 3dB,Power Step = 6dB,Num Step = 6。为了发起试呼,手机以6dBm的功率发送了第一个probe。在这种情况下,手机发送第四个probe所需的功率是( )。
A. 15dbm
B. 23dbm
C. 18dbm
D. 24dbm
【多选题】
在反向链路上, CDMA2000 系统是如何区分不同的用户的? ( )
A. 用Walsh 码区分不同的用户
B. 用长PN偏移量区分不同的用户
C. 用短PN偏移量区分不同的用户
D. 用时隙区分不同的用户
【多选题】
在下列给出的协议中,不是 TCP/IP 的应用层协议的是( )。
A. SMTP
B. FTP
C. HTTP
D. UDP
【多选题】
在某区域接收到的信号电平为-50 dBm,在该频率的干扰电平为-80 dBm,请问C/I值是多少?( )。
A. 3dB
B. E-100dB
C. 30dB
D. 60dB
E. 6dB
【多选题】
下列协议中不属于TCP/IP参考模型应用层的是( )。
A. RARP
B. ICMP
C. DNS
D. ARP
【多选题】
关于室内覆盖系统,下列说法错误的是:( )
A. 在建筑物的高层安装室内覆盖系统的原因主要是乒乓切换引起通话质量不好
B. 室内覆盖系统设计中,为覆盖范围更广,干放的功率越大越好
C. 在用无线直放为信源的室内覆盖系统中,可能会对接入的宏蜂窝造成干扰
D. 在进行室内覆盖系统功率调整时,应把无线信号控制在室内,禁止信号外泻
推荐试题
【填空题】
48.新概念武器主要有 ___ 、___、 ___ 、 ___ 、___ 等。
【填空题】
49.核武器具有____、冲击波、____ ___、核电磁脉冲和放射性沾染等五种杀伤破坏因素。
【填空题】
50.精确制导技术是指采用高技术直接命中概率超过___以上的武器。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive