In order to prevent network monitoring in the GPON system, the most commonly used method is?
In order to prevent network monitoring in the GPON system, the most commonly used method is?A . Information encryption B. Using physical transmission (not network) C. Wireless network transmission D. Use leased line transmissionView AnswerAnswer: A
On the U2000 network management, it is observed that the indicator light of the OLTP ON port is not green, indicating that the PON port is faulty.
On the U2000 network management, it is observed that the indicator light of the OLTP ON port is not green, indicating that the PON port is faulty.A . True B. FalseView AnswerAnswer: B
The prerequisites for eSight to automatically discover OLT and MXU devices through IP addresses, which do not include?
The prerequisites for eSight to automatically discover OLT and MXU devices through IP addresses, which do not include?A . esight and the device need to be on the same network segment, otherwise the device cannot be discovered using the ARP broadcast protocol B. esight and the device can communicate with...
The network management U2000 adds a line template to realize the mapping of user service flow to GEM PORT. The mapping mode includes? (Multiple choice)
The network management U2000 adds a line template to realize the mapping of user service flow to GEM PORT. The mapping mode includes? (Multiple choice)A . MAC B. PORT C. VLAN D. 802.IPView AnswerAnswer: BCD
What is the uplink wavelength of 10G EPONE?
What is the uplink wavelength of 10G EPONE?A . 1577nm B. 1270m (symmetrical) C. 1310m (asymmetrical) D.1490nmView AnswerAnswer: B
Regarding the principle of terminal selection, which of the following statements is correct? (Multiple choice)
Regarding the principle of terminal selection, which of the following statements is correct? (Multiple choice)A . Meeting special needs B. Need to consider cost C. No need to comply with project requirements D. Select the terminal type according to the network construction modeView AnswerAnswer: ABD
When the invitation message sent by user A reaches user B after passing through servers C, D, and E, the order of the server addresses recorded in the VIA field information in the message received by user B is?
When the invitation message sent by user A reaches user B after passing through servers C, D, and E, the order of the server addresses recorded in the VIA field information in the message received by user B is?A . C->D->E B. E->C->D C. E->D->C D. C->E->DView AnswerAnswer: C
If there are multiple set-top boxes under one ONT watching a multicast program at the same time, which of the following functions can be enabled on the OLT for the ONT multicast user to ensure that when one set-top box switches channels, the programs watched by other set-top boxes will not Affected
If there are multiple set-top boxes under one ONT watching a multicast program at the same time, which of the following functions can be enabled on the OLT for the ONT multicast user to ensure that when one set-top box switches channels, the programs watched by other set-top boxes will...
In the Huawei u2000 management system, when adding access network elements, you can only add them one by one.
In the Huawei u2000 management system, when adding access network elements, you can only add them one by one.A . True B. FalseView AnswerAnswer: A
Which statement about the hooligan ON U is correct? (Multiple choice)
Which statement about the hooligan ON U is correct? (Multiple choice)A . The PoN system comes with a rogue detection function B. The rogue ONU is mainly divided into random light and long light onu C. A rogue ONU may cause the ONU to fail to register D. Rogue Onu...