相关试题
【单选题】
Windows XP/Windows 7( )即插即用功能,开机后系统会显示找到新硬件的提示.___
A. 并口支持
B. 不支持
C. 支持
D. 串口支持
E.
F.
【单选题】
ZXAN#show card 不能查询到的信息为( )___
A. 单板状态
B. 光模块信息
C. 槽位信息
D. x=H,bc=00时,表示为增量热补丁包
E. 单板版本
F.
【单选题】
为确保VOIP的语音质量,通常情况下,网络报文延时时间为( )毫秒以上,用户通话将受影响.___
A. 1000
B. 2000
C. 800
D. 400
E.
F.
【单选题】
ZXAN#who 是指什么意思( )___
A. 显示MAC地址
B. 显示ONU在线情况
C. 显示系统
D. 显示登陆用户
E.
F.
【单选题】
下面保护倒换的外部命令哪一个优先级最高()___
A. 人工倒换
B. 强制倒换
C. 保护闭锁
D. 清除倒换
E.
F.
【单选题】
ZXAN#write该命令将同时保存( )SCXM.___
A. 主备用
B. 线卡
C. 主用
D. 备用
E.
F.
【单选题】
按先后顺序排列, PPPoE的discovery所包含的4个阶段为( )___
A. PADO->PADI->PADR->PADS
B. PADI->PADO->PADS->PADR
C. PADI->PADO->PADR->PADS
D. PADO->PADI->PADS->PADR
E.
F.
【单选题】
不属于中兴OLT类型的为( )___
A. C320
B. C220
C. 混合带宽
D. C300
E. 5680T
F.
【单选题】
测量光纤传输损耗时( )测量结果更精确.___
A. 光源、光功率计
B. OTDR
C. 光纤熔接机
D. PMD测试仪
E.
F.
【单选题】
查看网络跳数和路由跟踪的命令是( )___
A. TRACERT
B. TELNET
C. IPCONFIG
D. PING
E.
F.
【单选题】
常用的数据传输速率有kbps、Mbps、Gbps,1Mbps等于( )___
A. 1x2048kbps
B. 1x1024kbps
C. 1x512kbps
D. 1x256kbps
E.
F.
【单选题】
创建OMC客户端账户时,不需要设定账户的哪些参数( )___
A. 账户密码
B. 需要设定账户的管理域
C. 需要指定该账户登陆的IP
D. 需要指定账户登录的MAC
E.
F.
【单选题】
从ONU的接入能力来看,MA5626-24的MDU可以接入多少语音用户.( )___
A. 0
B. 8
C. 12
D. 24
E.
F.
【单选题】
单模光纤的平均接头损耗应不大于( )db/个.___
A. 0.1
B. 1
C. 1.5
D. 0.5
E.
F.
【单选题】
维护支撑过程中,如要接触电力设备,从业人员必须持有( ),严格按照电力设备的维护规程对设备进行维护.___
A. 通信工程师证
B. 安全员证
C. 登高作业证
D. 电工作业证
E.
F.
【单选题】
ZXCTN6100设备用于设备系统调试的接口是 ___
A. Qx口
B. LCT口
C. OUT口
D. GPS IN口
E.
F.
【单选题】
下面的哪个OSPF术语代表了一个相连的(或邻接的)路由器启动了OSPF进程,而且接口也被放入同一个域内?___
A. Link
B. Neighbor
C. LSA
D. STP
E.
F.
【单选题】
当网管数据和网元数据不一致时,通常进行( )操作.___
A. 数据上载
B. 数据下载
C. 不予理会
D. 进行数据库比较,具体情况具体分析
E.
F.
【单选题】
登陆5506-04的用户名和密码为( )___
A. GEPON,GEPON
B. gpon,gpon
C. GPON,GPON
D. gepon,gepon
E.
F.
【单选题】
登陆5506-07onu的交换芯片时,串口的波特率为( )___
A. 9600
B. 115200
C. 4800
D. 2400
E.
F.
【单选题】
第12块GC4B的第3个pon口下,授权号为11的AN5506-04型onu的私网登录地址为( )___
A. 10.25.110.11
B. 10.25.110.139
C. 10.25.112.11
D. 10.25.112.139
E.
F.
【单选题】
对PON口下所有ONU进行QINQ域的绑定应选择( )___
A. ONU绑定
B. 绑定PON口下再绑定ONU
C. PON口绑定
D. 绑定ONU后再绑顶PON口
E.
F.
【单选题】
对于ONU的语音业务优先级默认为( )___
A. 5
B. 7
C. 3
D. 0
E.
F.
【单选题】
对于U2000的网管用户描述错误的是( )___
A. 用户的权限可以修改
B. 网管用户的名称可以修改
C. 用户的访问IP可以修改
D. 用户的密码可以修改
E.
F.
【单选题】
对于交换机转发一个已知MAC地址单播包的情况,以下哪个描述过程描述是正确( )___
A. 会把这个帧向同一个VLAN内除了入端口以外其他端进行转发
B. 根据这个单播包的目的MAC地址和本身的MAC地址表进行比较
C. 会把目的IP地址和目的MAC地址进行比较
D. 根据这个单播包的源MAC地址和本身的MAC地址表进行比较
E.
F.
【单选题】
对于默认vlan 1的处理正确的是( )___
A. 对系统没影响不需要管它
B. 一定不能删除
C. 可以删除也可以不删除
D. 能删除的地方尽量删除
E.
F.
【单选题】
对于一个TCP/IP包,路由器依据什么信息决定这个包的路由转发.( )___
A. 目的IP地址
B. 目的MAC地址
C. 源IP地址
D. 源MAC地址
E.
F.
【单选题】
下面对LPR告警灯描述正确的是___
A. A.远端设备掉电指示灯,远端系统处于掉电状态时长亮
B. B.远端设备掉电指示灯,远端系统处于掉电状态时闪亮
C. C.远端设备掉电指示灯,仅当本、远端设备正常工作后,远端系统处于掉电状态,该灯才会闪亮
D. D.远端设备掉电指示灯,仅当本、远端设备正常工作后,远端系统处于掉电状态,该灯才会长亮。
E.
F.
【单选题】
尾纤在ODF和设备侧的预留应分别不超过( )mm,并在其两端分别固定一永久性标签.___
A. 100
B. 50
C. 150
D. 20
E.
F.
【单选题】
告警发生后,OMC上能实时看到网元上报的告警,当告警恢复后,OMC上告警也会自动清除,请问该告警自动清除的用户是( )___
A. OLT的root用户
B. 系统admin用户
C. 客户端当前登录的用户
D. OLT中的guest用户
E.
F.
【单选题】
根据ONU设置( )的不同,PON网络可以分为FTTH、FTTB和FTTC等多种形式.___
A. 路由
B. 位置
C. 节点
D. 方向
E.
F.
【单选题】
根据网际协议(IP)的规范,201.22.5.64属于哪类地址段.( )___
A. A类
B. B类
C. D类
D. C类
E.
F.
【单选题】
关于5520 AMS检查运行状态,以下说法中正确的是( )___
A. 通过命令ams_server status检查
B. 通过命令ponnbi_server status检查
C. 通过命令gw_server status检查
D. 通过命令ams_server start 检查
E.
F.
【单选题】
关于AAA级短彩业务接入组网描述要求正确的是( )___
A. 采用单节点、物理双路由的组网模型。可根据客户需要,选择互联网专线或数据专线接入。
B. 采用双互联网专线/双数据专线结合动态路由切换机制实现。
C. 采用单节点、逻辑双路由方式接入城域传送网
D. 客户侧/接入侧采用PTN/MSTP(MSAP)/PON接入技术,亦可根据情况采用光调制解调器、光纤收发器、裸光纤等光纤拉远技术
E.
F.
【单选题】
关于网卡流控设置的说法错误的是( )___
A. 当ONU需要采用下行限速功能时修改
B. 网卡高级选项中的流程控制选择生成和响应
C. 个别网卡需要关闭一个特殊项中断节流率
D. ONU的流控在网管上直接打开
E.
F.
【单选题】
关于序列号和SLID认证,以下说法中错误的是( )___
A. 通过WEB界面可以对GPON 010G-V I-240W-Q设置SLID。
B. 7342 R4.7版本支持SLID和SN的混合认证。
C. SLID注册的优先级比SN高
D. 7360 GPON R5.1版本支持SLID和SN的混合认证
E.
F.
【单选题】
光纤冷接子基本技术参数中,插入损耗要求小于( )___
A. 0.1dB
B. 0.15dB
C. 自承式蝶形引入光缆
D. 0.5dB
E.
F.
【单选题】
光纤损耗用损耗系数α(λ)表示,单位为( )___
A. dBm/km
B. dB/km
C. dBm
D. dB
E.
F.
【单选题】
下面关于冲突的说法中不正确的是( )___
A. 交换机的每个端口都是一个独立的冲突域
B. 交换机一个端口连接的网络上发生的冲突会影响另外一个端口连接的网络
C. 用网桥来取代一个网络中的HUB可以增加这个网络中冲突域数目
D. 减少一个网络上的主机数量可以降低冲突的发生的概率
E.
F.
【单选题】
光线在纤芯中能否不断反射前进,其传输条件是光线在纤芯中的( )___
A. 折射
B. 散射
C. 全反射
D. 反射
E.
F.
推荐试题
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table