刷题
导入试题
【多选题】
NB-IoT系统中,NPUSCH format1对应的RU包含的子载波数目可能为( ).
A. 12
B. 1
C. 3
D. 6
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
ABCD
解析
暂无解析
相关试题
【多选题】
NB-IoT小区频点在哪条命令里配置?( )
A. ADD CELLOP
B. ADD CELL
C. ADD PRB
D. ADD SECTOR
【多选题】
5G网络的上行参考信号SRS的作用是( )。
A. 波束管理
B. 用于上行相位噪声跟踪和补偿
C. 用于上行信道测量
D. 时频同步
【多选题】
下列关于5GNR slot format说法正确的是?( )
A. 在R15,UE-specific配置的周期和cell-specific配置的周期可以不一致
B. 对DL/UL分配的修改以slot为单位
C. SCS=60KHz时,支持配置Periodic=0.625ms
D. Cell-specific的单周期配置中,单个配置周期内只支持一个转换点
【多选题】
5G参数集包含哪些参数?( )
A. Slot format
B. SCS+CP
C. BWP
D. Bandwidth
【多选题】
下列哪个选项不属于竞争的随机接入过程?( )
A. 定位
B. 上行数据到达,上行失步
C. 切换
D. RRC连接重建
【多选题】
5G核心网网元包括( )。
A. NEF
B. AMF
C. SMF
D. UPF
【多选题】
CDMA系统中,移动台通过登记通知基站自己的位置.状态.识别等,登记发生在以下哪些过程中?( )
A. 切换过程中
B. 开.关机
C. 空闲状态
D. 呼叫过程中
【多选题】
定向天线方位角误差不大于( )。
A. ±3°
B. ±2°
C. ±10°
D. ±5°
【多选题】
属于物理层的设备有:( )
A. 路由器
B. 交换机
C. ?集线器
D. 中继器
【多选题】
当无线电波遇到尖角或薄边的阻挡物时,会产生( )现象
A. 反射
B. 直射
C. 散射
D. 绕射
【多选题】
一般而言,阴影衰落标准差随着使用频率的升高而( )。
A. 升高
B. 降低
C. 都有可能
D. 不变化
【多选题】
eSRVCC组网中新增加了( )和( )逻辑网元作为本地信令/媒体锚点,因此切换过程中的中断时间缩短,性能得以优化。
A. MGCF
B. ATCF
C. MRFC
D. ATGW
【多选题】
为什么用符号末端部分复制为循环前缀?( )
A. 增加符号时长
B. 减小峰均比
C. 保证时域信号周期连续
D. 保证循环符号数目为整数
【多选题】
天线对于LTE网络优化有着重要的意义,其典型的工程隐患包括( )。
A. 天线安装问题(如方向角无法调整)
B. 天线接反问题
C. 天线隔离度问题
D. 天面阻挡问题
【多选题】
VoLTE中承载视屏的是( )
A. QCI=1
B. QCI=9
C. QCI=5
D. QCI=8
E. QCI=2
【多选题】
以下哪些是EPC核心网网元SGW的功能?( )
A. SAE网络用户数据管理网元,提供鉴权和签约等功能,包含HLR功能;
B. SAE网络的边界网关,提供承载控制.计费.地址分配和非3GPP接入等功能,相当于传统的GGSN;
C. LTE接入下的控制面网元,负责移动性管理功能
D. 负责无线资源管理,集成了部分类似2G.3G基站和基站控制器的功能;
【多选题】
A3和A5事件的判决条件都包含的参数有( )。
A. Ocn
B. Hys
C. Thresh
D. Off
【多选题】
NB-IOT的优势有哪些?( )
A. 超低功耗
B. 超强覆盖
C. 超大连接
D. 超低成本
【多选题】
R13为NB-IoT指定了( )个频段。
A. 5
B. 3
C. 14
D. 7
【多选题】
专为运营商设计的面向物联网应用的.低功耗.低成本.广覆盖的窄带蜂窝通信技术是( )。
A. NB-IoT
B. LTE
C. 5G
D. eMTC
【多选题】
进行RSRP/RSRQ的测量在NB-IOT中的主要作用有哪些?( )
A. 执行上行功控控制
B. 进行小区选择和小区重选
C. 进行小区切换
D. 判断NB-IOT终端所处的覆盖等级
【多选题】
5G中PUSCH调制方式是:( )。
A. 16QAM
B. QPSK
C. 256QAM
D. 64QAM
【多选题】
5G 空中接口物理层PHY的功能包括( )。
A. HARQ软合并
B. FEC编解码
C. FEC编解码
D. 功控.测量和报告
E. HARQ纠错
【多选题】
当TRS配置的带宽超过其关联BWP的带宽时,UE应该( )。
A. 在TRS配置的带宽范围内接收TRS
B. 在其关联的BWP带宽范围内接收TRS
C. 在小区载波的带宽范围内接收TRS
D. 在UE支持的最小带宽范围内接收TRS
【多选题】
NFV是采用虚拟化技术.基于通用硬件实现电信功能。( ) 节点的软件化,专注于快速部署.应用规模扩展和升 级,是未来通信网络的基础技术?
A. 错误
B. 正确
【多选题】
SDN架构不包括( )。
A. 链路层
B. 控制层
C. 基础设施层
D. 应用层
【多选题】
VoLTE语音数据包间隔( )一个
A. 40ms
B. 80ms
C. 20ms
D. 160ms
【多选题】
E-UTRAN内切换准备失败包括( )。
A. 通过S1口切换时目标站点拒绝来自MME的切换请求
B. 同站切换源小区没有收到来自目标小区的UE上下文释放请求
C. 通过X2口切换时目标站点拒绝来自源站的切换请求
D. 同站小区间切换请求遭拒绝
【多选题】
LTE网络测试中常见的异常事件有:( )。
A. 切换失败
B. RRC重配置失败
C. Attach失败
D. 掉线
E. RRC连接失败
【多选题】
每个RO上可用的Preamble个数是:( )
A. 32个
B. 64个
C. 16个
D. 128个
【多选题】
室内分布系统使用馈线的阻抗是:( )
A. 50欧姆
B. 150欧姆
C. 75欧姆
D. 120欧姆
【多选题】
多径效应造成的信号衰落服从 ( )分布。
A. 泊松
B. 对数正态
C. 莱斯
D. 瑞利
【多选题】
所谓联合接地是指( )的联合。
A. 交流工作地
B. 防雷地
C. 直流工作地
D. 保护地
【多选题】
以下PCI规划原则中哪一个是不对的?( )
A. 同一个小区的所有邻区中不能有相同的PCI
B. 同频邻小区PCI无需考虑MOD3或MOD6的限制,任意分配即可
C. 相邻的两个小区PCI不能相同
D. 邻小区CRS尽量在频域上分开
【多选题】
下列关于小区选择标准的说法错误的是( )。
A. 有先验信息时,按照小区存储参数进行搜索。
B. 当有先验信息时UE没有选择到合适的小区,会进入无先验信息小区选择流程。
C. 无先验信息时,逐个频点搜索,搜其上最强的小区。
D. 针对Release 8版本,小区选择的标准是Srxlev > 0 AND Squal > 0;
【多选题】
天线安装时,定向天线方位角与规划数据误差不大于( )。
A. ±5°
B. ±0.5°
C. ±3°
D. ±1°
【多选题】
ARQ机制是下面( )的主要功能。
A. RLCAM
B. PDCP
C. RLCUM
D. MAC
【多选题】
面对兴起的物联网技术,3GPP主要有三大标准,分别是?( )
A. LTE-M
B. NB-IoT
C. LPWAN
D. EC-GSM
【多选题】
为了达到涵盖范围延伸(Coverage Enhancement, CE),定义了三种等级CE Level,分别对抗最大耦合损失(Maximum Coupling Loss, MCL)为( ).( ).( )信号能量衰减。
A. 134dB
B. 164dB
C. 144dB
D. 154dB
【多选题】
Initial UL/DL BWP.Additional UL/DL BWP.SUL BWP均由哪三部分配置组成?( )
A. bwp-id
B. bwp-Uplink?
C. bwp-Common
D. bwp-Dedicated
推荐试题
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
【单选题】
Which feature in the dNS security module provide on and off network DNS protection?___
A. Data Loss Prevention
B. Umbrella
C. Real-time sandboxing
D. Layer-4 monitoring
【单选题】
Which a dverse consequence can occur on a network without BPDu guard ?___
A. The olde st switch can be elected as the root bridge
B. Unauthorized switches that are connected to the network can cause spanning-tree loops
C.
D. ouble tagging can cause the switches to experience CAM table overload.
【单选题】
What configuration is required for multitenancy ?___
A. shared infrastructure
B. multiple carriers
C. co-located resources
D. multiple separate zones
【单选题】
Why does ISE require its own certificate issued by a trusted CA?___
A. ISEs certificate allows guest devices to validate it as a trusted network device
B. It generates certificates for guest devices ba sed on its own certificate
C. It requests certificates for guest devices from the Ca server based on its own certificate.
D. ISE's certificate allows it to join the network security framework
【单选题】
which attack involves large numbers of ICMP packets with a spoofed source IP address?___
A. smurf attack
B. Teardrop attack
C. Nuke attack
D. SYN Flood attack
【单选题】
Which statement about interface and global access rules is true?___
A. Interface access rules are processed before global access rules.
B. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
C. The implicit allow is proce ssed after both the global and interface access rules
D. If an interface access rule is applied, the global access rule is ignored
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用