刷题
导入试题
【单选题】
在ODN网络中,OLT下行传输波长为()。___
A. 850nm
B. 1490nm
C. 1310nm
D. 1550nm
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
在ODN网络中,ONT上行传输波长为()。___
A. 850nm
B. 1490nm
C. 1310nm
D. 1550nm
【单选题】
在ODN网络中,法兰盘的允许衰耗值为()。___
A. 0.2db以下
B. 0.5db以下
C. 1.0db以下
D. 1.5db以下
【单选题】
在ODN网络中,光缆接头的允许衰耗值为()。___
A. 0.1db以下
B. 0.2db以下
C. 0.3db以下
D. 0.4db以下
【单选题】
在ODN网络中,使用光功率计测试分光器下行出口端光功率大小,应选择1490nm波长进行测试。___
A. 1490nm
B. 1550nm
C. 1310nm
D. 850nm
【单选题】
在PON网络中,使用光功率计测量ONU侧的接收光功率,使用的波长是()。___
A. 1310nm
B. 1550nm
C. 850nm
D. 1490nm
【单选题】
在URL中不填写协议类型,IE浏览器默认使用()协议。___
A. FTP
B. HTTP
C. File
D. Gopher
【单选题】
在WindosXP系统中,OLT设备与ONU之间的光纤中断拨号提示()错误代码。___
A. 691
B. 678
C. 676
D. 734
【单选题】
在WindosXP系统中,由于接入层链路中断提示()错误代码。___
A. 678
B. 691
C. 769
D. 734
【单选题】
在WindosXP系统中,由于用户电脑与ONT设备之间的网线故障,宽带拨号会出现的错误代码是()。___
A. 678
B. 691
C. 769
D. 734
【单选题】
在WindosXP系统中,由于用户输入的帐号或密码错误,宽带拨号会出现的错误代码是()。___
A. 678
B. 691
C. 769
D. 734
【单选题】
在Windows资源管理器中,单击需要选定的第一个文件,按下()键,再用鼠标左键单击需要选定的最后一个文件,能够一次选定连续的多个文件。___
A. Ctrl
B. Tab
C. Alt
D. Shift
【单选题】
在windows操作系统的DOS命令中,查看路由路径的命令是()。___
A. tracert
B. ping
C. nslookup
D. ipconfig
【单选题】
在windows操作系统的DOS命令中,查看主机IP地址和MAC地址的命令是()。___
A. tracert
B. ipconfig/all
C. ping
D. netstat
【单选题】
在windows操作系统的DOS命令中,检查网络通断的命令是()。___
A. tracert
B. ping
C. nslookup
D. ipconfig
【单选题】
在windows操作系统的DOS命令中,可以用()命令查询网站域名所对应服务器的IP地址。___
A. ping
B. ipconfig
C. netstat
D. nslookup
【单选题】
在windows操作系统的DOS命令中,实现域名解析的命令是()。___
A. tracert
B. ping
C. nslookup
D. ipconfig
【单选题】
在Windows命令行窗口中,运行IPCONFIG命令通常用以()。___
A. 查看当前TCP/IP配置信息
B. 测试到达目的主机的连通性
C. 显示当前所有连接及状态信息
D. 查看当前使用的DNS服务器
【单选题】
在Windows系统的DOS界面输入命令(),就可以获取电脑网卡MAC地址的全部信息。___
A. ipconfig
B. tracert
C. ipconfig/all
D. ping
【单选题】
在电力线附近作业,特别是在与电力线合用的电杆上作业时,装维人员应注意与电力线等其它线路保持()距离。___
A. 安全
B. 平行
C. 间隔
D. 交叉
【单选题】
在电力线路附近作业时不得举梯移动,否则极易导致()事故。___
A. 火灾
B. 高空坠落
C. 物体打击
D. 触电
【单选题】
在发生大客户故障时,各相关单位和部门采取()。___
A. 先业务恢复、后故障修复
B. 先故障修复、后业务恢复
C. 对故障修复
D. 进行业务恢复
【单选题】
在杆路上作业时,应先用()检查该电杆上附挂的线缆、吊线,确认没有带电后再作业。___
A. 试电笔
B. 万用表
C. 近电感应报警器
D. 传感器
【单选题】
在高层FTTH接入工程中,光纤分纤箱一般应安装在()。___
A. 楼梯间
B. 走廊内
C. 建筑外墙
D. 弱电井
【单选题】
在工程挂测中,账号现场带宽测速误差范围在账号开户带宽的±()%以内。___
A. 9
B. 10
C. 11
D. 12
【单选题】
在光分配网络(ODN)中,分光器不能采用()级分光,只要业务能正常开通、用户能上网就行。___
A. 一
B. 二
C. 三
D. 四
【单选题】
在光分配网络(ODN)中,分光器采用()级分光,只要业务能正常开通、用户能上网就行。___
A. 二
B. 三
C. 四
D. 五
【单选题】
在光缆敷设过程中,应严格注意光纤的拉伸强度、弯曲半径,避免光纤被()。___
A. 缠绕
B. 扭转
C. 损伤
D. 以上都是
【单选题】
在光通信中,ODN1:32光分路器的损耗是:()。___
A. 0.5db
B. 13.5db
C. 15.1db
D. 17.1db
【单选题】
在计算机网络中,通常把提供并管理共享资源的计算机称为()。___
A. 服务器
B. 工作站
C. 网关
D. 路由器
【单选题】
在任何情况下,每个PON口下可以接入的ONU(光网络单元)个数是()。___
A. 有限的
B. 无限的
C. 既可以有限,也可以无限
D. 不能有限,也不能无限
【单选题】
在使用光功率计时,选择测试波长的按键为()。___
A. dB
B. ZERO
C. dλ
D. λ
【单选题】
在通过暗管布放皮线光缆时,如遇到有管径较小或管孔内有其它线缆的管道时,需要采用()。___
A. 铁丝
B. 塑料穿管器
C. 润滑剂
D. 钢制穿管器
【单选题】
在通信线路附近有其它线缆时,在没有辨明该线缆使用性质前,一律按()处理。___
A. 通信线路
B. 电力线
C. 高压线
D. 低压线
【单选题】
在维护过程中,如要接触电力设备,作业人员必须持有(),严格按照电力设备的维护规程对设备进行维护。___
A. 通信工程师证
B. 登高作业证
C. 电工作业证
D. 安全员证
【单选题】
在以太网中,双绞线使用()与其他设备连接起来。___
A. BNC接口
B. AUI接口
C. RJ-45接口
D. RJ-11接口
【单选题】
在易受雷击、强电影响且无法对光缆进行可靠接地的环境,宜选用()。___
A. 金属蝶形引入光缆
B. 非金属蝶形引入光缆
C. 自承式金属蝶形引入光缆
D. 管道蝶形引入光缆
【单选题】
在用户电脑上,利用()命令就能快速判断主机设置的DNS服务器IP地址是否正确。___
A. TRACERT
B. NSLOOKUP
C. PING
D. NETSTAT
【单选题】
在掌上家客APP进行投诉回单时,家宽投诉的处理措施应选择()。___
A. 维护措施-电力供电
B. 网络优化-修改数据
C. 维护措施-复位
D. 维护措施-排障
【单选题】
在作业过程中,遇有电力线触碰或断落在通信线缆上,应()作业。___
A. 继续
B. 向上级汇报后继续
C. 设置防护措施前继续
D. 立即停止
【单选题】
掌上运维APP回复装机工单时,施工照片应上传()家庭网关安装位置、服务便利贴、线缆标签。___
A. 用户照片
B. 施工三联单
C. 光缆照片
D. 光交照片
推荐试题
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用