刷题
导入试题
【多选题】
以下有关华为T200网管说法正确的是( )___
A. T2000上当前告警结束后自动转为历史告警
B. T2000后台运行期间不能修改系统时间。
C. 采用脚本导入方式升级,网管会自动把脚本中的网元配置信息重新下发给设备
D. 通过修改全网配置文件,可以实现保护子网信息的单独导入
E.
F.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
BD
解析
暂无解析
相关试题
【多选题】
以下有关华为网管监视说法正确的是( )___
A. T2000上设置15分钟监视开始时间(必须晚于网管和网元的当前时间)。
B. T2000上设置15分钟监视开始时间(可以早于于网管和网元的当前时间)。
C. 15分钟监视结束时间(必须晚于15分钟监视开始时间),可以不设置
D. 15分钟监视结束时间(必须晚于15分钟监视开始时间),必须设置
E.
F.
【多选题】
引发AU-AIS的告警有( )。___
A. LOS、LOF
B. MS-AIS
C. HP-REI,HP-RDI
D. OOF
E.
F.
【多选题】
由于GPON设备采用了无源光分路器设备接入各种类型的ONU,所以各个ONU是否可以在OLT上注册和无源光网络中的光功率关系极大.所以需要注意以下几点( )___
A. GPON OLT的输入光功率必须小于-8dBmw,ONU不能不通过分光器或者衰减器直接和OLT连接(特别是测试时要注意),否则会造成OLT光模块损坏
B. ONU最大的接收功率不能超过-30DB
C. 在OLT上电的情况下,最好能测试一下ONU处的接收光功率,要保证接收光功率在 -24DB 以上
D. 如果没有 PON功率计,要测试一下每个ONU处的光衰减, ODN的衰减不能大于-25DB(OLT的发光功率在1-4DB)
E.
F.
【多选题】
有关PDH体制和SDH体制,正确的说法是( )___
A. 传送相同数目的2M时,SDH占用的频带要宽
B. SDH和PDH有相同的线路码型
C. SDH比PDH上下2M灵活、方便
D. SDH可以来传送PDH业务
E.
F.
【多选题】
有三个子网 172.16.12.0/24,172.16.13.0/24,172.16.14.0/24。将它们聚合为( )。___
A. 172.16.0.0/24
B. 172.16.14.0/24
C. 172.16.12.0/22
D. 172.16.14.0/22
E.
F.
【多选题】
有线宽带设备退网后,由维护部门进行PON OMC数据删除,注意( )信息的回收.___
A. WLAN
B. VLAN
C. IP
D. ID
E.
F.
【多选题】
与DWDM相比,传统的网络扩容方式有( )___
A. 空分复用
B. 电时分复用
C. 光时分复用
D. 频分复用
E.
F.
【多选题】
在( )情况下,网管无法采集远端故障节点的告警信息。___
A. 光缆线路故障
B. 节点故障
C.
D. CC通道故障 D.支路盘故障
E.
F.
【多选题】
在()情况下,网管无法采集远端故障节点的告警信息。___
A. DCC通道故障
B. 光缆线路故障
C. 节点故障
D. 支路盘故障
E.
F.
【多选题】
在BGP 中,以下对于AS 的描述正确的是( )___
A. 在同一个AS 内,所有路由器必须运行相同的路由协议
B. 运行相同协议的路由器都可以认为在同一个AS 内
C. AS 可以通过运行EGP 协议与其它AS 交换信息
D. AS 是一组拥有相同管理策略的路由器
E.
F.
【多选题】
在Exchange Server2003中,管理员可以使用Exchange系统管理器配置邮件传递选项,请问可以配置的邮件传递属性有( ).___
A. 发送邮件大小的最大值
B. 接收邮件大小的最大值
C. 最大收件人数
D. 最大发件人数
E.
F.
【多选题】
在ISIS 网络中,对整个网络进行区域划分的好处有( )___
A. 减少路由器中的路由条目的数量
B. 减小网络故障影响的范围
C. 避免路由环路
D. 有利于路由聚合
E.
F.
【多选题】
在OptiX PTN中, LMSP 可保护哪些接口.( ) ___
A. CD1
B. AD1
C. POD41
D. ASD1
E.
F.
【多选题】
在OSPF路由协议中,一个普通的路由器和BDR之间的关系是:( )___
A. Neighbor
B. Adjacency
C. 没有关系
D. 以上答案均不正确
E.
F.
【多选题】
在PON设备组网中,OLT和各个ONU之间的环路时延各不相同,其可能的原因有( )___
A. 各ONU距OLT的光纤路径不同
B. 各ONU元器件的不一致性
C. OLT与ONU之间网速的快慢
D. 环境温度的变化和器件老化
E.
F.
【多选题】
在RIP路由协议中,以下有关减少路由自环的方法正确的是()___
A. 触发更新是从减少路由自环发生的概率方面来考虑问题的
B. 水平分割的方法只对消除两台路由器之间的自环有作用
C. 设置抑制时间的方法可能导致路由的慢收敛
D. 为了减轻路由自环产生的后果,RIP协议规定了最大跳数
E.
F.
【多选题】
在TCP/IP模型中下层与上层的关系是?___
A. 上层调用下层的功能
B. 下层调用上层的功能
C. 上层为下层提供服务
D. 下层为上层提供服务
E.
F.
【多选题】
在T-MPLS保护中,下述外部发起的命令应该支持 ___
A. 工作锁定
B. 保护锁定
C. 强制倒换
D. 人工倒换
E.
F.
【多选题】
在U2000上添加PTN设备时,默认的用户名是( )、口令是( )___
A. root
B. password
C. admin
D. szhw
E.
F.
【多选题】
在网管上看S200 的TFE单板上报LFD帧定位丢失的告警,可能的原因有(  )___
A. VCG(EOS)端口没有配置容量;
B. 本端设置GFP,但对端非GFP
C. 某些时隙通道延时过长
D. 某些时隙通道出现告警,误码等
E.
F.
【多选题】
帧中继LMI 一般占用哪几个DLCI?___
A. 0
B. 16
C. 1007
D. 1023
E.
F.
【多选题】
支持软件环回的单板有( )___
A. 线路板
B. 支路板
C. 交叉板
D. 光板
E.
F.
【多选题】
中兴 C220插箱走线区的走线包括( )、( )、( )等.___
A. 网线
B. 光纤
C. 同轴
D.
E.
F.
【多选题】
中兴PTN系列产品中都支持E1业务、以太网业务、ATM业务配置的设备有( )___
A. ZXCTN6100
B. ZXCTN6200
C. ZXCTN6300
D. ZXCTN9008
E.
F.
【多选题】
中兴PTN系列产品中以太网端口所支持的VLAN模式有( )___
A. 接入
B. 干线
C. 混合干线
D. 混合接入
E.
F.
【多选题】
《安全生产法》规定安全教育的种类包括( )___
A. 转岗教育
B. 三级安全教育
C. 特种作业人员安全教育
D. 经常性安全教育
E.
F.
【多选题】
1:8的光分器,光功率损耗不大于( ),1:16的光分器,光功率损耗不大于( )___
A. 10.7
B. 13.9
C. 17.2
D. 7.4
E.
F.
【多选题】
7360 FX 支持的双上联的协议有( )___
A. LACP
B. VRRP
C. RSTP
D. MSTP
E.
F.
【多选题】
7360 PON板PWR、A/S指示灯,表述正确的是( )___
A. A/S 绿色:代表主用
B. PWR 绿色(闪亮):代表上电及软件装载正常
C. A/S 熄灭:代表备用
D. PWR 熄灭:代表上电及软件装载异常
E.
F.
【多选题】
7360下面( )为PON板类型.___
A. nglt-a
B. MANC-C
C. nglt-c
D. fglt-a
E.
F.
【多选题】
DWDM系统基本的组网方式有( ),由这些组网方式与SDH设备组合可以组成复杂的光传输网络。 ___
A. 链形组网方式
B. 星形组网方式
C. 点到点方式
D. 环形组网方式
E.
F.
【多选题】
FTTH工程中需要注意的技术事项有( )___
A. 光缆尽量熔接,减少使用法兰盘
B. 采用电信级的AN5516系列产品
C. 如果光缆距离较长,需进行光功率预算
D. 光接头全部采用SC/APC,减少维护复杂度
E.
F.
【多选题】
FTTH冷接操作,必带的相关工具有哪些( )___
A. 光功率计
B. 光纤剥线钳
C. 熔接机
D. 切割刀
E.
F.
【多选题】
FTTX接入用户,目前ONU设备安装方式有( )___
A. 壁挂安装方式
B. 室外多媒体箱安装方式
C. 桌面安装方式
D. 室内多媒体箱安装方式
E.
F.
【多选题】
GPON技术中,OLT下行采用( )进行数据下发,ONU采用( )进行数据上传.(按顺序)___
A. 广播
B. 单播
C. 链路复用
D. 时分复用
E.
F.
【多选题】
Internet地址分配组织规定的三个网络地址保留用做私有地址( ),这三个网络的地址不会在因特网上被分配.___
A. 172.16.0.0 ~ 172.31.255.255
B. 10.0.0.0 ~10.255.255.255
C. 172.16.0.0 ~ 172.255.255.255
D. 192.168.0.0 ~ 192.168.255.255
E.
F.
【多选题】
MA5626产品属于FTTB类型的ONU,其配置规格根据端口数不同,以下( )端口数是正确的.___
A. 24
B. 16
C. 48
D. 8
E.
F.
【多选题】
ODN中主要的光无源器件有( )___
A. PON光模块
B. 光纤连接器
C. 光分路器
D. 光纤
E.
F.
【多选题】
OLT及ONU的版本检查包括( )___
A. 所有单板的版本必须配套,不能出现一个系统内出现多个版本号。
B. 检查版本文件的大小必须与发布的版本文件大小一致。
C. 主备主控板上保存的版本文件必须一致
D. 检查是否存在多余的版本文件
E.
F.
【多选题】
ONU根据应用场景有哪些主要类型.( )___
A. FTTX
B. FTTH
C. FTTB
D. FTTN
E.
F.
推荐试题
【单选题】
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URl filtering to solve the problem?___
A. Enable URL filtering and use URL categorization to block the we bsites that violate company
B. Enable URL filtering and create a blacklist to block the websites that violate company policy
C. Enable URL filtering and create a whitelist to block the websites that violate company policy
D.
E. nable URL filtering and use URL categorization to allow only the websites that company policy allows users to access.
【单选题】
Within an 802. 1x-enabled network with the auth Fail feature configured, when does a switch port get placed into a restricted VLAN?___
A. When a conected client fails to authenticate after a certain number of attempts.
B. if a connected client does not support 802. 1x
C. when AAA new-model is ena bled
D. after a connected client exceeds a specified idle time
E. when 802. 1x is not globally enabled on the Cisco Catalyst switch
【单选题】
Which type of attack does a proxy firewall protect against ?___
A. cross-site scripting attack
B. worm traffic
C. port scanning
D. DDoS attacks
【单选题】
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?___
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device pin or password before proceeding with the operation
C. It notifies the device user and proceeds with the erase operation
D. It immediately erases all data on the device
【单选题】
What is a valid implicit permit rule for traffic that is traversing the ASa firewall?___
A. ARPs in both directions are permitted in transparent mode only
B. Unicast IPv4 traffic from a higher security interface to a lower security interface is permittee in routed mode only.
C. Unicast IPv6 traffic from a higher security interface to a lower security interface is permitted in transparent mode only.
D. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in transparent mode.
E. Only BPDUs from a higher security interface to a lower secur ity interface are permitted in routed mode
【单选题】
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URl and becoming infected with malware ?___
A. Enable URL filtering on the perimeter router and add the URls you want to block to the router's local URL list
B. Enable URL filtering on the perimeter firewall and add the URls you want to allow to the router's local URL list.
C. Enable URL filtering on the perimeter router and add the URls you want to allow to the firewall's local URL list
D. Create a blacklist that contains the URl you want to block and activate the blacklist on the perimeter rout
E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.
【单选题】
How does PEAP protect the EAP exchange ?___
A. It encrypts the exchange using the server certificate
B. It encrypts the exchange using the client certificate
C. It validates the server-supplied certificate,and then encrypts the exchange using the client certificate
D. It validates the client-supplied certificate,and then encrypts the excha nge using the server certificate
【单选题】
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?___
A. contextual analysis
B. holistic understanding of threats
C. graymail management and filtering
D. signature-based IPS
【单选题】
Refer to the exhibit【nat (inside,outside)dunamic interface】 Which translation technique does this configuration result in?___
A. DynamIc PAT
B. Dynamic NAT
C. Twice NAT
D. Static NAT
【单选题】
Refer to the exhibit which are repre sents the data center?___
A. A
B. B
C. C
D. D
【单选题】
While trouble shooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?___
A. IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10 10.2
B. IKE Phase 1 main mode has successfully negotiated between 10.1.1.5 and 10.10..
C. IKE Phase 1 aggressive mode was created on 10.1.1.5, but it failed to negotiate with
【单选题】
Refer to the exhibit All ports on switch 1 have a primary vLan of 300 Which devices can host 1 reach?___
A. host 2
B. server
C. host 4
D. other devices within VLAN303
【单选题】
Which option is the cloud-based security service from Cisco the provides URL filtering, web browsing content security, and roaming user protection?___
A. Cloud Web service
B. Cloud Advanced Malware Protection
C. Cloud We b Security
D. Cloud Web Protection
【单选题】
How can you detect a false negative on an IPS?___
A. View the alert on the ips
B. Review the ips log
C. Review the is console
D. Use a third- party system to perform penetration testing.
E. Use a third- party to audit the next generation firewall rules
【单选题】
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?___
A. STP BPDU guard
B. Loop guard
C. EtherChannel guard
D. STP Root guard
【单选题】
what improvement does EAP-FASTv2 provide over EAP-FAST? ___
A. It allows multiple credentials to be passed in a single EAP exchange.
B. It supports more secure encryption protocols
C. It allows faster authentication by using fewer packets.
D. It addresses security vulnerabilities found in the original protocol
【单选题】
When users login to the Client less Ssl Vpn using https://209.165.201.2/test ,which group policy will be applied?___
A. test
B. clientless
C. sales
D. DfitGrp Policy
E. Default RAGroup
F. Default WEB VPN
G. roup
【单选题】
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?___
A. AAA with LOCAL database
B. AAA with RADIUS server
C. Certificate
D. :Both Certificate and aaa with LoCAL database
E. Both Certificate and AAA with RADIUS server
【单选题】
What' s the technology that you can use to prevent non malicious program to runin the computer that is disconnected from the network?___
A. Firewall
B. Sofware Antivirus
C. Network IPS
D. Host IPS
【单选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【单选题】
Which product can be used to provide application layer protection for tcp port 25 traffic?___
A. ESA
B. CWS
C. WSA
D. ASA
【单选题】
which iPS mode is less secure than other options but allows optimal network through put ?___
A. inline mode
B. inline-bypass mode
C. transparent mode
D. Promiscuous mode
【单选题】
Which feature of the Cisco Email security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?___
A. reputation based filtering
B. signature based IPS
C. contextual analysis
D. graymail management and filtering
【单选题】
Which type of social-engineering attack uses normal tele phone service as the attack vector?___
A. smishing
B. dialing
C. phishing
D. vishing
【单选题】
Which quantifiable item should you consider when you organization adopts new technologies?___
A. exploits
B. vulnerability
C. threat
D. Risk
【单选题】
Referencing the ClA model, in which scenario is a hash- only function most appropriate ?___
A. securing data at rest
B. securing real-time traffic
C. securing data in files
D. securing wireless transmissions
【单选题】
Which ports must be open between a aaa server and a microsoft server to permit Active Directory authentications?___
A. 445 and 389
B. 888 and 3389
C. 636 and 4445
D. 363 and 983
【单选题】
Refer to the exhibit for which reason is the tunnel unable to pass traffic___
A. the tunnel is failing to receive traffic from the remote peer
B. the local peer is unable to encrypt the traffic
C. the ip address of the remote peer is incorrect
D. UDP port 500 is blocked
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
How can you protect CDP from reconnaissance attacks?___
A. Enable dynamic ARP inspection on all untrusted ports.
B. Enable dot1x on all ports that are connected to other switches.
C.
D. isable CDP on ports connected to endpoints.
【单选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which option is a key security compone nt of and MDM deployment ?___
A. using network-specific installer packages
B. using an application tunnel by default
C. using self-signed certificates to validate the server
D. using MS-CHAPv2 as the primary
E. AP method
【单选题】
Which Firepower Management Center feature detects and block exploits and hack attempts?___
A. Content blocker
B. file control
C. intrusion prevention
D. advanced malware protection
【单选题】
hich description of the nonsecret numbers that are used to start a Diffie- Hellman exchange is ture?___
A. They are preconfigured prime integers.
B. They are large pseudorandom numbers.
C. They are very small numbers chosen from a table of known valuses
D. They are numeric values extracted from ha shed system hostnames
【多选题】
Which two characteristics of an application layer firewall are true?___
A. provides stateful firewal functionality
B. has low processor usage
C. provides protection for multiple applications
D. provides rever se proxy services
E. is immune to URL manipulation
【多选题】
Which two devices are components of the BYOD architectural framework?___
A. Nexus 7010 switch
B. Cisco 3945 Router
C. Identify Services Engine
D. Wireless Access oints
E. Prime Infrastructure
【多选题】
Which two actions can a zone based firewall take when looking at traffic? ___
A. forward
B. inspect
C. drop
D. broadcast
E. filter
【多选题】
n which two situations should you use in-band management?___
A. when management applications need concurrent access to the device
B. when you require administrator access from multiple locations
C. when a network device fails to forward packets
D. when you require ROMMON access
E. when the control plane fails to respond
【多选题】
What are two ways to prevent eavesdropping when you perform device management tasks?___
A. Use an SSH connection.
B. Use SNMPv3
C. Use out-of-band management
D. Use SNMP
E. Use in-band management
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用