【多选题】
SDN的意义在于削弱底层基础设施的作用 , 软件可以实时地对其进行重新配置和编程。( )
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
以下哪个LTE天线方案仅支持单流?( )
A. 4x2MIMO
B. 8天线TM7Beamforming
C. AdaptiveMIMO/BF
D. 8天线2x2MIMO
【多选题】
( )消息可被用来进行媒体流和码流信息的更新。
A. 183response
B. INVITE Request
C. UPDATE
D. 100Trying
【多选题】
下面哪种话单是SGW产生的?( )
A. S-CDR
B. SGW-CDR
C. P-CDR
D. PGW-CDR
【多选题】
测试时,当设备连接不上( )
A. 让别人送一套过来
B. 不测了
C. 多次拔插不行重启电脑查看
D. 直接回去换新的
【多选题】
定时器T310的作用是( )
A. UE等待RRC连接响应的时间
B. UE监测无线链路失败的等待时间
C. UE等待RRC重建响应的时间
D. UE监测到无线链路失败后转入RRC_IDLE状态的等待时间
【多选题】
在2015年9月的RAN #69会议上经过激烈的PK,( )和( )的融合产物胜出,这就是NB-IoT。
A. EC-GSM
B. NB-CIoT
C. LTE-M
D. NB-LTE
【多选题】
SR可以基于如下哪种PUCCH格式单独发送?( )
A. PUCCHformat2
B. PUCCHformat0
C. PUCCHformat3
D. PUCCHformat1
【多选题】
TRS的频域密度(density)为( )。
【多选题】
对于5G NR来说,一个无线帧占用多少毫秒?( )
A. 1
B. 10
C. 5
D. 不是固定的,和子载波带宽有关
【多选题】
以下设备哪些是无源设备( )。
A. 耦合器
B. 以上都是
C. 功分器
D. 衰减器
【多选题】
依据《中国电信移动通信网络运行维护 规程》的组织架构,移动通信网络的维护管理部门是( )。
A. 网运部
B. NOC
C. 网发部
D. 市场部
【多选题】
下列哪些是移动网常采用的抗干扰技术( )。
A. 分集技术
B. 同频复用
C. 跳频
D. 功率控制
【多选题】
以下哪个无线承载是用来承载RRC消息并映射到CCCH?( )
A. SRB1
B. MIB
C. SRB0
D. SRB2
【多选题】
通话期的语音包大小取决于当前的( )。
A. PRB数
B. 编码速率
C. SINR
D. RSRP
E. RSRQ
【多选题】
( )场景会触发非竞争随机接入。
A. RRC_CONNECTED态下,为了定位UE,需要timingadvance
B. 初始接入时建立无线连接:UE会从RRC_IDLE态到RRC_CONNECTED态
C. 切换(handover):此时UE需要与新的小区建立上行同步
D. RRC连接重建过程(RRCConnectionRestablishmentprocedure)
E. RRC_CONNECTED态下,下行数据到达(此时需要回复ACK/NACK)时,上行处于“不同步”状态
F. RRC_CONNECTED态下,上行数据到达(例:需要上报测量报告或发送用户数据)时,上行处于“不同步”状态或没有可用的PUCCH资源用于SR传输(此时允许已经处于上行同步状态的UE使用RACH来替代SR的作用)
【多选题】
关于CA的跨载波调度以下说法不正确的是( )。
A. PCell DL Grant/UL Grant仅可在PCell上发送和接收
B. PCell DL Grant/UL Grant可在SCell上发送和接收
C. 需终端能力支持
D. SCell 的DL Grant/UL Grant可在PCell上发送和接收
【多选题】
5G物理上行控制信道PUCCH的功能包括( )。
A. 承载UCI信息
B. 承载随机接入请求信息
C. 承载用户数据
D. 承载CSI信息
【多选题】
EN-DC下哪些SRB支持被配置成Split SRB ?( )
A. SRB1
B. SRB3
C. SRB0
D. SRB2
【多选题】
5G网络物理层的下行参考信号CSI-RS的作用是( )。
A. 下行信道测量
B. 时间/频率跟踪
C. 下行信号的解调
D. RSRP计算及移动性处理
【多选题】
目前,NR FR1和LTE共同确定的Gap,Gap pattern有几种?( )
【多选题】
5G无线上行物理控制信道是( )。
A. xPDSCH
B. xPUSCH
C. xPRACH
D. xPUCCH
【多选题】
以下哪些是 IPv6 的特征? ( )
A. 多报文头嵌套实现扩展
B. 通过流标签识别数据流
C. 支持地址自动配置
D. 支持 Mobile IP
【多选题】
下列关于IPv6描述正确的是( )。
A. 当一个IPv6报文有多个扩展头部时,扩展头部可以随机出现
B. 当一个IPv6报文有 多个扩展头部时,扩展头部必须有序地出 现
C. IPv6的地址长度为64bits
D. IPv6的地址长度为128bits
【多选题】
室内建筑损耗是墙壁结构(钢.玻璃.砖等).楼层高度.建筑物相对于基站的走向.窗户区所占的百分比等的函数。以下说法不正确的是( )
A. 有窗户区域的损耗一般小于没有窗户区域的损耗
B. 建筑物内开阔地的损耗小于有走廊的墙壁区域的损耗
C. 街道墙壁有铝的支架比没有铝的支架产生更小的衰减
D. 位于市区的建筑平均穿透损耗大于郊区和偏远区
E. 只在天花板加隔离的建筑物比天花板和内部墙壁都加隔离的建筑物产生的衰减小
【多选题】
当无线电波遇到大量尺寸远小于波长的颗粒时,会产生( )现象。
【多选题】
话音业务测试从呼叫时间上可以分为( )。
A. CQT和DT
B. 马尔可夫呼叫和一般语音呼叫
C. 行进中呼叫测试和定点呼叫测试
D. 周期性呼叫和定点拨打测试
【多选题】
网络发起的寻呼流程有:( )
A. USIM寻呼
B. C-RNTI寻呼
C. S-TMSI寻呼
D. IMSI寻呼
【多选题】
以下是哪个节点是eSRVCC中媒体面的锚点?( )
A. ATGW
B. ACCAS
C. MME
D. ATCF
E. Emsc
【多选题】
使用 LTE 分组域支持话音业务的技术方案是:( )
A. 双待机
B. VOLTE.SRVCC
C. CSFB
【多选题】
在测量报告消息中上报的RSRQresult = 3,表明RSRQ的实际值范围为( )。
A. -3 <= RSRQ
B. -3.5 <= RSRQ < -3
C. -19 <= RSRQ < -18.5
D. -18.5 <= RSRQ < -18
【多选题】
SIB1和所有SI消息可以在哪些信道传输?( )
A. PDCCH
B. PDSCH
C. BCCH
D. DL-SCH
【多选题】
在NB-IoT中,不合理的邻区规划可能会导致( )。
A. 掉线
B. 重选失败
C. 弱信号
D. 信号质量差
【多选题】
以下哪一项技术能实现物理设备的互联互通?( )
A. GPRS
B. TOY
C. TCT
D. IOT
【多选题】
SCG的主小区被称作( )。
A. PSCell
B. SCG Secondary cell
C. Primary cell
D. MCG Secondary cell
【多选题】
5G的含义包括:无所不在.超宽带.( )的无线接入。
A. 高可信
B. 高可靠
C. 低延时
D. 高密度
【多选题】
下面属于5G NR下行链路reference signal的是:( )。
A. Phase-tracking reference signals for PDSCH
B. Demodulation reference signals for PDCCH
C. Demodulation reference signals for PBCH
D. Demodulation reference signals for PDSCH
E. CSI reference signals
【多选题】
《中国电信移动通信网络运行维护规程》规定维护生产操作职责包括数据维护与制作.数据制作与维护.软件版本验证及升级.网络运营分析.服务支撑.网络优化和( )
A. 日常维护作业
B. 网络故障监控处理
C. 重大活动网络保障
D. 工程随工及验收
【多选题】
以下关于电波传播的描述不正确的是( )。
A. 电磁波在不同的媒质中,传播速度不同
B. 电磁波波长越长,传播速度越快
C. 电磁波频率越高,传播损耗越大
D. 电磁波波长越长,绕射能力越强
推荐试题
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections