【单选题】
在敷设蝶形光缆时,蝶形光缆不能长期浸泡在( )___
A. 泥中
B. 水中
C. 土中
D. 墙中
E.
F.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
为了加强网络安全,命令行方式登入设备需要采用支持加密的( )协议.___
A. Telnet
B. UDP
C. SSH
D. RSTP
E.
F.
【单选题】
在敷设蝶形光缆时,瞬间最大牵引力不得超过光缆允许张力的( )___
A. 0.8
B. B.0.9
C. C.0.6
D. D.1
E.
F.
【单选题】
在服务工作中,对客户提出的要求,应如何处理___
A. 您的要求太过分了,我们无法满足
B. 在符合规定、条件允许的情况下,应予满足
C. 您说的问题我们不清楚,请您找回客户经理解决
D. 你当移动是什么单位啊,你懂不懂规矩
E.
F.
【单选题】
在服务中对客户提出的要求不清楚或没有把握时,应如何应对?___
A. 应满足客户任何要求
B. 应给予耐心解释并婉言拒绝
C. 详细记录,请示上级后尽快将解决方案或处理结果反馈给客户
D. 当做没听到
E.
F.
【单选题】
在工程现场,通过串口线从超级终端登陆06型ONU时,波特率和密码为:( )___
A. 9600,GEPON
B. 9600,gpon
C. 115200,GEPON
D. 11520,gpon
E.
F.
【单选题】
在工程现场,通过串口线从超级终端登陆07型ONU里的IAD时,波特率和密码为:( )___
A. 9600,GEPON
B. 9600,gpon
C. 115200,GEPON
D. 11520,gpon
E.
F.
【单选题】
关于IPv6,下面的论述中正确的是___
A. IPv6数据包的首部比IPv4复杂
B. IPv6的地址分为单播、广播和任意播3种
C. 主机拥有的IPv6地址是唯一的
D. IPv6地址长度为128比特
E.
F.
【单选题】
在工作表的某一单元格中,输入:=99-1l-28,则该单元格内显示( )___
A. =99-11-28
B. 1999年11月28日
C. 60
D. 99-11-28
E.
F.
【单选题】
在故障处理流程中的,首先应进行( )___
A. 分析告警
B. 定位故障
C. 处理故障
D. 抢通恢复业务
E.
F.
【单选题】
在光时域仪测量光纤损耗的波形中,初始脉冲是由什么因素引起的( )___
A. 光纤端面的菲涅尔反射引起的
B. 接头处的光功率损耗引起的
C. 沿光纤反向传播受到光纤的损耗引起的
D. 光纤缺陷或光纤断裂引起的
E.
F.
【单选题】
在光纤接头中,LC和SC型连接器都属于( )。___
A. 椭圆
B. B.圆锥形
C. C.矩形
D. D.圆形
E.
F.
【单选题】
为了实现业务量相对较小的接入,我公司还提供了小型MSAP机框式设备-OPCOM3500E-6,可以插入___块业务盘, OPCOM3500-6中的群路盘不能与OPCOM3500E-12中的群路盘通用___
A. 2
B. B、4
C. C、6
D. D、8
E.
F.
【单选题】
在光纤熔接过程中,光纤固定于光纤定位板上,通过对光纤进行X、Y、( )三个方向的调整,使纤芯对准后,方能熔接.___
【单选题】
在光纤通信中,一般使用APD雪崩二极管作为( )___
A. 光电检测器
B. 光衰耗器
C. 光源
D. 中继器
E.
F.
【单选题】
在互联网专线维护中,Ping网关是一种常用的测试方法,而互联网专线工程中经常默认将一个网段中的第一个可用的主机地址作为该网段的网关,现有一网段218.155.42.72/30,请分析一下,该网段的网关是___
A. 218.155.42.1
B. 218.155.42.72
C. 218.155.42.73
D. 218.155.42.74
E.
F.
【单选题】
在环形网中最常用的网元是 ()___
A. TM
B. ADM
C. REG
D. DXC
E.
F.
【单选题】
在基站侧对SDH支路板进行环回操作,若向交换机方面进行环回,则称为()___
A. 内环回
B. 外环回
C. 左环回
D. 右环回
E.
F.
【单选题】
在架空光缆日常维护中,杆路逐杆检修的周期为( )___
A. 每年一次
B. 两年一次
C. 每年两次
D.
E.
F.
【单选题】
关于设备非QinQ的软件版本升级到QinQ软件版本,配置脚本转换出现端口占用的问题错误的说法是:( )___
A. 首先在DUBUG目录set old_config2qinq all命令进行配置适配
B. 主控盘版本为R1.21.03.34以后的不存在此问题
C. 在DEBUG目录对后8槽位凡是端口业务数不为0的端口执行以下命令:set epon slot <1-18> onu <onulist> port <portlist> flag 2 reserve
D. 做完所有命令后,不用保存直接重启
E.
F.
【单选题】
在监控传输误码性能时,一般情况下BBE的引出先后关系(即哪一种BBE会引出后面相应的BBE)是:___
A. RS、MS、HP、LP
B. LP、HP、MS、RS
C. MS、RS、HP、LP
D. LP、MS、RS、HP
E.
F.
【单选题】
在街道上架空光缆距地面的最小垂直净距为( )米___
A. 5.5
B. 5
C. 4.5
D. 4
E.
F.
【单选题】
在进行客户端的故障处理前,技术服务人员应事先( )得到客户允许后方可进入现场.___
A. 与客户联系
B. 准备好光猫
C. 准备好电动车
D. 准备好记录本
E.
F.
【单选题】
为了提高注册效率,IMS允许一个用户存在多个公有标识(IMPU)时,一个IMPU注册成功,则相关的IMPU均注册成功。这种机制叫( )___
A. 隐式注册
B. 通配注册
C. 第三方注册
D. 重注册
E.
F.
【单选题】
在局域网中使用的交换机主要是( )___
A. 以太网交换机;
B. B、FDDI 交换机 ;
C. C、TM 交换机;
D. D、令牌交换机
E.
F.
【单选题】
在开放系统互连参考模型(OSI)中,( )以帧的形式传输数据流。___
A. 网路层
B. 会话层
C. 传输层
D. 数据链路层
E.
F.
【单选题】
在跨省传输专线资源勘查场景中,仅受理由( )CRM发起的跨省传输专线资源勘查工单。___
A. 总部集团客户部
B. 省公司客户部
C. 集团数据部
D. 省公司数据部
E.
F.
【单选题】
在链路聚合时,以下哪个端口能加入链路聚合组( ) ___
A. 镜像的监控端口
B. 镜像的目的端口
C. 配置了静态ARP的端口
D. 以上都不能
E.
F.
【单选题】
在两纤双向复用段环中,最多可包括多少个能参与复用段倒换的网元()___
A. 15
B. 16
C. 128
D. 127
E.
F.
【单选题】
在路由器上从下面哪个模式可以进行接口配置模式?___
A. 用户模式
B. 特权模式
C. 全局配置模式
D. 以上都不是正确的
E.
F.
【单选题】
在路由器中,决定最佳路由的因素是( )___
A. 最小的路由跳数
B. 最小的时延
C. 最小的metric值
D. 最大的带宽
E.
F.
【单选题】
华为5620G是()。___
A. OLT
B. ODN
C. ONU
D. OIT
E.
F.
【单选题】
在某大型小区,一共有10个室外光交箱,每个光交箱内装有1台分光器。某天出现用户批量投诉,ONU出现LOS灯告警,在某一光交箱内拔下分光器的主纤测试无光,以下判断错误的是 ___
A. 可能是该纤芯故障或者OLT设备侧ODF架跳纤问题
B. 可能是OLT设备停电或者该PON口光模块故障
C. 需要到进去小区红线内第一个跳纤点测试定位是否红线内光缆故障
D. 可以断定是红线外光缆或OLT设备故障
E.
F.
【单选题】
在配置ACL时需要使用到反掩码,请选出下列关于反掩码说法正确的选项___
A. 反掩码中取1的位,表示网段中对应位需要进行匹配比较
B. 反掩码中取0的位,表示网段中对应位需要进行匹配比较
C. 反掩码不能全取值为0
D. 反掩码不能全取值为1
E.
F.
【单选题】
以下支持web页面且支持OMCI协议新标准的ONU是( )___
A. HG850a
B. HG810
C. HG850
D. HG850e
E.
F.
【单选题】
为实现用户精确化绑定,一般要求BRAS将用户接入信息上报给AAA记录,以下不是BRAS可以上报的信息有( ).___
A. 用户接入VLAN
B. 用户接入BRAS端口
C. 用户MAC地址
D. 用户的资费套餐
E.
F.
【单选题】
在配置ONT模板时,那种类型ONU可以选择SNMP管理模式( )___
A. A类
B. B类
C. B类
D. 都不需要
E.
F.
【单选题】
在配置语音前,需要向用户获取( )些数据___
A. MGI IP
B. NEXT HOP
C. MGC IP
D. 物理终结点前缀
E. 临时终结点通配符和范围
F.
【单选题】
在上门服务过程中,服务人员应严格遵守客户的机房管理制度,严格杜绝因工作导致客户的生产设备停机或故障的情况。处理带风险性的故障,( ),尽量做好应急防范或数据备份措施,在征得客户同意后开始实施操作。___
A. 应向客户解释存在的风险及后果
B. B、应向客户经理解释存在的风险及后果
C. C、应全面了解存在的风险
D. D、应注意应急预案的制定
E.
F.
【单选题】
在设置wftp需要设置ftp服务器的ip,这个ip是( )___
A. ONU的管理ip
B. 服务器的设备的ip
C. 固定的ip 192.168.1.1
D.
E.
F.
【单选题】
在涉及到基站中继的故障时,需要自建传输监控人员做环路确定故障所在,环路中的内环、外环是相对于()而言的___
A. 基站
B. 交换局
C. 中继
D. 传输设备
E.
F.
推荐试题
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.