The establishment, maintenance and dismantling of a session is completed through a series of message interactions between the SIP user and the server, so each information contained in the SIP text is unique, and no single information will appear A phenomenon in which a value occurs multiple times.

The establishment, maintenance and dismantling of a session is completed through a series of message interactions between the SIP user and the server, so each information contained in the SIP text is unique, and no single information will appear A phenomenon in which a value occurs multiple times.A . True...

April 5, 2023 No Comments READ MORE +

When the FTTH user has the fault phenomenon of "off-hook and no power", the possible reasons are? (Multiple choice)

When the FTTH user has the fault phenomenon of "off-hook and no power", the possible reasons are? (Multiple choice)A . Phone failure B. POTS port failure C. OLT failure D. The line between the ONU and the phone is faultyView AnswerAnswer: ABD

April 5, 2023 No Comments READ MORE +

When OLT traffic scheduling, which of the following traffic will be marked in green?

When OLT traffic scheduling, which of the following traffic will be marked in green?A . Traffic below CIR B. Traffic above CIR but below PIR C. Flow above PIR D. Higher traffic than CBSView AnswerAnswer: A

April 5, 2023 No Comments READ MORE +

Regarding the Gem port design principles, which of the following statements is incorrect?

Regarding the Gem port design principles, which of the following statements is incorrect?A . Gem ports need to be planned under the same PON port, and Gem port IDs between PON ports can be repeated. B. In FTTH mode, each user (ONU) is allocated a Gem port for each service...

April 4, 2023 No Comments READ MORE +

The traffic suppression function can work on unicast packets and multicast packets, but since broadcast packets are generally sent by equipment at the initial stage of communication, in order not to affect specific communication services, access network equipment does not provide support for broadcast Traffic suppression.

The traffic suppression function can work on unicast packets and multicast packets, but since broadcast packets are generally sent by equipment at the initial stage of communication, in order not to affect specific communication services, access network equipment does not provide support for broadcast Traffic suppression.A . True B. FalseView...

April 4, 2023 No Comments READ MORE +

In the ACL, if the data packets need to be filtered according to the source IP address information, destination IP address information, port number and other information of the data packets, then the ACL number range to be created is?

In the ACL, if the data packets need to be filtered according to the source IP address information, destination IP address information, port number and other information of the data packets, then the ACL number range to be created is?A . 3000-3999 B. 2000-2999 C. 5000-5999 D. 4000-4999View AnswerAnswer: A

April 4, 2023 No Comments READ MORE +

Regarding multicast, which of the following descriptions is incorrect?

Regarding multicast, which of the following descriptions is incorrect?A . Add Lgmp user under BTV. By default, a multicast user can watch 8 programs. B. The report sent by the user is captured in the board logic and sent to the board CPU C. Configure general parameters of Layer 2...

April 4, 2023 No Comments READ MORE +

By default, what type of OLT queue scheduling mode is it?

By default, what type of OLT queue scheduling mode is it?A . WRR B. WFQ C. CQ D. PQView AnswerAnswer: D

April 4, 2023 No Comments READ MORE +

The system of IEEE 802.1X protocol includes: (Multiple choice)

The system of IEEE 802.1X protocol includes: (Multiple choice)A . Supplicant System (client) B. Authenticator System (authentication system) C. Account system (billing system) D. authentication server system (authentication server)View AnswerAnswer: ABD

April 4, 2023 No Comments READ MORE +

Which of the following statements about SSH connection is incorrect?

Which of the following statements about SSH connection is incorrect?A . SSH can be applied to remote encrypted connections and file transfer encryption B. The SSH protocol can encrypt all transmitted data, effectively preventing information leakage during remote management QUESTION NO : C. From the perspective of the client, SSH...

April 4, 2023 No Comments READ MORE +