Big Cyber Monday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H35-211_V2.5 Questions and Answers

Question # 6

When configuring IPTV services on the U2000, what templates are included in the IGMP templates?

A.

Permission templates

B.

Multicast user templates

C.

Program templates

D.

Preview parameter template

Full Access
Question # 7

In the GPON system, Huawei recommends that optical splitting levels do not exceed 2. Which of the following networking is incorrect?

A.

Level-1 optical splitting 1:2, Level-2 optical splitting 1:16

B.

Level-1 optical splitting 1:16, Level-2 optical splitting 1:16

C.

Level-1 optical splitting 1:8, Level-2 optical splitting 1:8

D.

Level-1 optical splitting 1:2, Level-2 optical splitting 1:8

Full Access
Question # 8

According to the NGN architecture, drag the following devices to the corresponding layers. (Score only when all the answers are correct.)

Full Access
Question # 9

Which of the following is not a prerequisite for the eSight to automatically discover OLTs and MxUs using IP addresses?

A.

You have the permission to access resources.

B.

The eSight and devices must be on the same network segment. Otherwise, the ARP broadcast protocol cannot be used to discover devices.

C.

The eSight and devices can communicate with each other (ping each other).

D.

SNMP parameters have been set on eSight and are consistent with SNMP parameters on devices.

Full Access
Question # 10

(Single choice) The following statement about defending MAC Spoofing is wrong:

A.

MAC Anti-MAC-Spoofing features are mutually exclusive with WMAC, SC, PPPoE-SMAC features at the VLAN level

B.

After the Anti-MAC-Spoofing function is enabled, the system automatically implements dynamic binding of the MAC address to the service flow

C.

After enabling the Anti-MAC-Spoofing function, for IPoE users using fixed IP, the user needs to be statically configured

D.

Turning off the Anti-MAC-Spoofing function can only remove the fixed table items, which does not affect the user’s service application, but the service forwarding plane will be interrupted

Full Access
Question # 11

In the NGN system, the ( ) adopts the packet technology to provide a unified integrated transmission platform with high reliability, QoS guarantee, and large capacity.

A.

Network control layer

B.

Core switching layer

C.

Service management layer

D.

Edge access layer

Full Access
Question # 12

(Multi-select) You use an OTDR to locate an abnormally attenuated point on the optical path. After connecting the OTDR to the line under test, which of the following parameters can be set?

A.

Set the measurement range

B.

Set the wavelength

C.

Set the mode

D.

Set the pulse width

Full Access
Question # 13

The complete SIP message interaction process contains multiple requests and responses. Which SIP header field is used to indicate which specific request a given response corresponds to?

A.

CSeq

B.

Call-ID

C.

First line

D.

Message body

Full Access
Question # 14

In SNMP v2c, user passwords can be encrypted.

A.

TRUE

B.

FALSE

Full Access
Question # 15

Deploying an Ethernet port protection group in the upstream direction of the OLT can improve the reliability and the bandwidth of the uplink.

A.

TRUE

B.

FALSE

Full Access
Question # 16

In Layer 2 multicast, how many multicast IP addresses can a multicast MAC address correspond to?

A.

8

B.

16

C.

24

D.

32

Full Access
Question # 17

Compared with Type C dual-homing protection, which of the following statements about Type C single-homing protection are correct?

A.

Protects important services such as enterprise and base station private line access services.

B.

When the OLT or uplink of the OLT is faulty, services can be switched to the other OLT.

C.

If the OLT is faulty, services are interrupted.

D.

The networking is simple, and the OLT and ONU management is simple.

Full Access
Question # 18

When ONT fails or the hardware needs to be replaced, the ONT needs to be removed on the OLT and then a new ONT needs to be registered.

A.

wrong

B.

Right

Full Access
Question # 19

After the anti-IP attack function is enabled on an OLT, the OLT cannot be remotely managed through Telnet.

A.

TRUE

B.

FALSE

Full Access
Question # 20

(Multiple choice) Which of the following measures can be adopted by GPON in terms of traffic control?

A.

GEM-CAR

B.

GEM mapping

C.

Flow-CAR

D.

T-CONT-CAR

Full Access
Question # 21

(Single) When you configure HUAWEI Network Management U2000 for FTTH IPTV service access, which of the following templates needs to be configured?

A.

SNMP template

B.

MGC template

C.

IGMP template

D.

Value-added service templates

Full Access
Question # 22

The priority of the packets at the egress port can be mapped or set directly. Which of the following statements about priority processing is correct?

A.

The priority policy must be tag-in-package regardless of the priority setting mode.

B.

The priority mapping can be set separately for the inner and outer priorities.

C.

The priority mapping needs to match the corresponding mapping profile. The mapping in a profile is fixed.

D.

Priorities of outbound and inbound packets are strictly mapped. An outer VLAN ID cannot be mapped to the priority of an inner VLAN ID.

Full Access
Question # 23

(Radio) To improve link reliability, the LT device uses two upstream ports 0/19/0 and 0/20/0 to configure a timedelay protection group. Which of the following commands is optional?

A.

huawei(config)#interface giu 0/19huawei(config-if-giu-0/19)#offline-tx-off-time 0 500

B.

huawei(protect-group-0)#protect-group member port 0/19/0 role work

C.

huawei(protect-group-0)#protect-group enable

D.

huawei(config)#protect-group 0 protect-target sth-nni port workmode timedelay

Full Access
Question # 24

Assume that there are 500 broadband users with a concurrency rate of 40%, penetration rate of 50%, online bandwidth of 4 Mbit/s, duty cycle of 12.5%, 1 channel, and coverage rate of 70%. Then the bandwidth is 35 Mbit/s.

A.

TRUE

B.

FALSE

Full Access
Question # 25

Which of the following statements about terminal selection principles are correct?

A.

Terminal types should be selected based on the network construction mode.

B.

Cost needs to be considered.

C.

Special requirements must be considered.

D.

Project requirements do not need to be considered.

Full Access
Question # 26

Which one of the following protection schemes can provide OLT-level protection?

A.

Type B dual-homing

B.

Ethernet port protection group

C.

LACP

D.

Type B single-homing

Full Access
Question # 27

(Multi-select) eSight is network management software positioned for enterprise networks and can view ONT device details, including which of the following?

A.

ONT port information

B.

Speed

C.

Optical module temperature

D.

The optical module transmit power

Full Access
Question # 28

(Single) A total of 100 multicast users on an OLT are watching 20 multicast programs. Assuming that each multicast program occupies 2 Mbit/s bandwidth, how much multicast traffic is currently on the OLT upstream port?

A.

200 Mbit/s

B.

100 Mbit/s

C.

40 Mbit/s

D.

50 Mbit/s

Full Access
Question # 29

(Multi-select) In U2000, adding a line template to map user traffic flows to GEM Ports supports which mapping modes?

A.

MAC

B.

PORT

C.

VLAN

D.

802.1p

Full Access
Question # 30

Which of the following options can improve the service experience of multicast users when switching channels (shorter switching time)?

A.

When adding a multicast program, disable the pre-join feature

B.

Enable Quick (Fast) Leave when adding a multicast user

C.

When you add a multicast user, enable the preview feature

D.

Use group addresses with small values

Full Access
Question # 31

Different DBA need to be configured for different services. Drag the DBA to corresponding services. (Score only when all the answers are correct.)

Full Access
Question # 32

(Radio) The upstream (ascending) wavelength of the 10G EPON system is:

A.

1577 nm

B.

1270 nm (symmetric)

C.

1310 nm (asymmetric)

D.

1490 nm

Full Access
Question # 33

When the Type C dual-home protection linkage uplink detection is enabled, if the OLT or the OLT uplink fails, the Type C dual-home protection can switch over to another OLT.

A.

True

B.

False

Full Access
Question # 34

(Single-choice) HSI service uses VLAN tags to bind users precisely. If there are 5K FTTH users hanging under the OLT, which VLAN switching scheme is recommended?

A.

User VLAN → C-VLAN → S+C-VLAN

B.

S+C → S+C

C.

C → S

D.

C → S+C

E.

C → S+C

Full Access
Question # 35

(Radio) The following is not a QoS service model is

A.

DiffServ

B.

IntServ

C.

FIFO service

D.

Best Effort

Full Access