Which of the following types of DBA bandwidth will reduce the upstream bandwidth of the PON port after the DBA horizontal board is configured and successfully used by the ONT? (Multiple choice)

Which of the following types of DBA bandwidth will reduce the upstream bandwidth of the PON port after the DBA horizontal board is configured and successfully used by the ONT? (Multiple choice)A . assure B. max C. best effort D. fixedView AnswerAnswer: AD

April 9, 2023 No Comments READ MORE +

The main solution to MAC address spoofing does not include? (Multiple choice)

The main solution to MAC address spoofing does not include? (Multiple choice)A . Limit the number of MAC addresses learned by users B. Manually configure a static MAC address C. Automatically perform MAC address binding D. Replace user terminalView AnswerAnswer: AD

April 9, 2023 No Comments READ MORE +

The IGMP version on the OLT is configured as V2. When the OLT receives the igmr v3 join message forwarded from the OnT, what will it do?

The IGMP version on the OLT is configured as V2. When the OLT receives the igmr v3 join message forwarded from the OnT, what will it do?A . Normal forwarding B. Send a specific group query message C. Send a general group query message D. Discard directlyView AnswerAnswer: D

April 9, 2023 No Comments READ MORE +

If the multicast service is only deployed in private networks. Which multicast address segment should be preferred for planning?

If the multicast service is only deployed in private networks. Which multicast address segment should be preferred for planning?A . 232.0.0.0/8 B. 224.0.0.0/8 C.239.0.0.0/8 D. 225.0.0.0/8View AnswerAnswer: C

April 9, 2023 No Comments READ MORE +

In FTTX business networking and data planning, user security needs to be considered. Which of the following measures can prevent inter-user attacks?

In FTTX business networking and data planning, user security needs to be considered. Which of the following measures can prevent inter-user attacks?A . Defense against IP spoofing B. Use port physical information to identify users C. User Layer 2 Isolation and Controlled Mutual Access D. Use anti-mac to solveView AnswerAnswer:...

April 9, 2023 No Comments READ MORE +

After the DHCP simulation is started, it will automatically stop when the system default timeout time is reached, and the simulation results will be deleted at the same time

After the DHCP simulation is started, it will automatically stop when the system default timeout time is reached, and the simulation results will be deleted at the same timeA . True B. FalseView AnswerAnswer: A

April 9, 2023 No Comments READ MORE +

Generally speaking, the lower the suppression level of OLT broadcast messages, the more obvious the protection effect of the port/single board on the wide insertion traffic

Generally speaking, the lower the suppression level of OLT broadcast messages, the more obvious the protection effect of the port/single board on the wide insertion trafficA . True B. FalseView AnswerAnswer: A

April 9, 2023 No Comments READ MORE +

The device will periodically send and receive LMCP messages to avoid information loss. If no messages are received within () LACP message interaction periods, the system will consider the port to be faulty.

The device will periodically send and receive LMCP messages to avoid information loss. If no messages are received within () LACP message interaction periods, the system will consider the port to be faulty.A . 3 B.5 C.4 D.2View AnswerAnswer: A

April 9, 2023 No Comments READ MORE +

According to the information above, which of the following statement is correct?

Check the protection configuration in the OLT example as follows huawei (config) = protect-group 0 protect-target gpon-uni-port work mode time delay huawei ( protect-group-0 ) #protect-group member port 0/5/0role work huawei ( protect-group-0 ) #protect-group member port 0/5/l role protect huawei (protect-group-0) #protect-group enable According to the information above, which...

April 9, 2023 No Comments READ MORE +

When using the H.248 protocol to deploy VoIP services, the registration information sent by the MG to the MGC contains the following information, indicating that each command sent this letter is

When using the H.248 protocol to deploy VoIP services, the registration information sent by the MG to the MGC contains the following information, indicating that each command sent this letter is Services {Method=Restart Reason=[901])A . ON Tre-register B. board restart C. reboot system D. reset cold startView AnswerAnswer: D

April 8, 2023 No Comments READ MORE +