Huawei H35-211_V2.5-ENU HCIP-Access V2.5 Online Training
Huawei H35-211_V2.5-ENU Online Training
The questions for H35-211_V2.5-ENU were last updated at Dec 24,2024.
- Exam Code: H35-211_V2.5-ENU
- Exam Name: HCIP-Access V2.5
- Certification Provider: Huawei
- Latest update: Dec 24,2024
When deploying GPON Type C single-homing protection, which of the following descriptions is correct?
- A . A branch fiber breaks, and the status of the OLT’s work port changes to standbyY
- B . The two ports protected by the OLT side cannot send and receive data at the same time
- C . When the olt uplink fails, protection switching can be triggered
- D . The service configuration of ONU access is exactly the same as the configuration before protection
The device will periodically send and receive LMCP messages to avoid information loss. If no messages are received within () LACP message interaction periods, the system will consider the port to be faulty.
- A . 3
- B . 5
- C . 4
- D . 2
The protection scope of GP ON Type B dual-homing protection includes? (Multiple choice)
- A . Active and Standby OLTs
- B . Main and backup main fiber
- C . The active and standby PON ports of the OLT
- D . Primary and backup branch fibers
When Type C dual-homing protection linkage uplink detection, if OLT or OLT uplink fails, Type C dual-homing protection can be switched to another OLT
- A . True
- B . False
Which of the following statements about defending against MAC Spoofing is incorrect?
- A . MAC Anti-MAC Spoofing’ feature and WMAC, SC, PPPOE SMAC features are mutually exclusive at VLA level
- B . After the anti-MAC Spoofing function is enabled, the system will automatically realize the dynamic binding of the AC address and the service flow
- C . After the Anti-MAC Spoofing function is enabled, for I PoE users using fixed IPs, users need to be configured statically
- D . Disable the Anti-MAC Spoofing function. The only action involved is to delete certain entries, which does not affect user service applications, but the service forwarding plane will be interrupted.
When it is detected that the CPU of the OLT main control board continues to rise, which are the possible reasons? (Multiple choices)
- A . Illegal user login
- B . Network Loops
- C . Cyber attacks
- D . Rogue ONU
In order to prevent network monitoring in the GPON system, the most commonly used method is?
- A . Information encryption
- B . Using physical transmission (not network)
- C . Wireless network transmission
- D . Use leased line transmission
When the PIT P switch is enabled globally or in the VLAN service template of the OLT, the service virtual port is allowed to carry upstream packets, the Vendor tag is switched, and the user upstream packets carry Vendor tarf information, which of the following about the OLT processing strategy of PITP message is correct?
- A . The OLT adds a local Vendor tap to the upstream PITP message
- B . The OLT directly forwards the user-side PITP message without any processing
- C . The OLT leaves the Vendor tag carried in the uplink PITP message, plus the local Vendor tag
- D . OLT discards uplink PITP packets
Which of the following statements about SSH connection is incorrect?
- A . SSH can be applied to remote encrypted connections and file transfer encryption
- B . The SSH protocol can encrypt all transmitted data, effectively preventing information leakage during remote management QUESTION NO :
- C . From the perspective of the client, SSH provides two levels of security verification
- D . The SSH protocol works at the network layer
Which of the following is not a QOS service model?
- A . Diffserv
- B . Intserv
- C . FIFO service
- D . Best Effort