Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H35-260 Questions and Answers

Question # 6

Which of the following descriptions about the possible reasons for PTN upgrade loading or activation failure are correct?

A.

AISCA loads the A2SCA software package

B.

Board initialization failed

C.

Insufficient space on the CF card

D.

After the loading is completed, the active/standby switchover is performed

Full Access
Question # 7

In the NG-WDM system, which one of the following boards supports optical line protection?

A.

OTU

B.

DCP

C.

OLP

D.

QCP

Full Access
Question # 8

TCP provides connectionless-oriented, best-effort transport services

A.

True

B.

False

Full Access
Question # 9

Which item is wrong about the description of PTN network MC-PWAPS protection features?

A.

1+1 mode is not supported

B.

DNI-PW can only be used to transmit base station traffic

C.

DNI-PW supports multi-hop, but single-hop PW is recommended for service deployment

D.

The existing network is generally not linked with MCLAG

Full Access
Question # 10

Qinia technology can be used when multiple users need to share the same VCTRUNK and use the same VLANID.

A.

True

B.

False

Full Access
Question # 11

In Optix PTN, what kind of MPLS Tunnel APS protection is supported?

A.

1+1 single-ended protection

B.

1+1 double-ended protection

C.

1:1 single-ended protection

D.

1:1 double-ended protection

Full Access
Question # 12

In the MPLS-TPOAM architecture of PTN equipment, what are the functions of network performance maintenance?

A.

LB

B.

LM

C.

LT

D.

DM

Full Access
Question # 13

1+1 protection means that when the sender sends service flows to both working and protected tunnels at the same time, the receiver selectively receives service flows according to the tunnel

status or external commands.

A.

True

B.

False

Full Access
Question # 14

The IP address of the interconnection interface generally uses a 30-bit mask. Which of the following IP addresses can be configured at both ends of the link?

A.

171.168.1.4 and 171.168.1.5

B.

190.136.3.14 and 190.136.3.15

C.

192.168.5.33 and 192.168.5.34

D.

100.1.2.64 and 100.1.2.65

Full Access
Question # 15

During the normal operation of the network, the service channel protected by ODUK SNCP generates a condition for triggering protection switching, and the service has been automatically switched to the protection channel. When the fault

of the working channel is eliminated, the service cannot be automatically restored to the working channel.

A.

The SNCP service type is inconsistent with the service scenario requirements

B.

Protection group 'Recovery Mode' is 'Non-Recovery'

C.

A small number of bit errors occur in the working channel

D.

Manual switching, locking switching or forced switching commands are implemented artificially

E.

When the working channel is normal, the business needs to delay the "waiting for recovery time" and then switch from the protection channel to the working

channel.

Full Access
Question # 16

Optix Datacollector supports black box fault data collection for various products. Which of the following products are not supported?

A.

NG SDH

B.

WDM

C.

COS

D.

PTN

Full Access
Question # 17

In the PTN network, the L3 node needs to learn the ARP message to forward the message to the SGW. What is the type of the ARP response message?

A.

Broadcast

B.

Unicast

C.

Multicast

D.

Multicast

Full Access
Question # 18

Linear multiplexing section can be deployed for STM-1 interface in PTN network. What are the following overhead bytes used to transmit APS automatic protection switching protocol?

A.

A1

B.

A2

C.

K1

D.

K2

Full Access
Question # 19

Where in the L2/L3 node is the VLAN in the Layer 2 header stripped in the packet sent by the base station in the LTE solution?

A.

Network side interface

B.

L2VE sub-interface

C.

L3VE sub-interface

D.

LOOPBACK interface

Full Access
Question # 20

When enabling NE performance monitoring events on the U2000 network management system, which of the following options are correct?

A.

Set the monitoring start time of 15 minutes on the U2000 (must be later than the current time of the NMS and NEs)

B.

Set the monitoring start time of 15 minutes on the U2000 (it can be earlier than the current time of the NMS and NEs)

C.

15-minute monitoring end time (must be later than 15-minute monitoring start time), can not be set

D.

15 minutes monitoring end time (must be later than 15 minutes monitoring start time), must be set

Full Access
Question # 21

Which of the following logical function blocks is used for multiplexing section switching?

A.

MST

B.

MSP

C.

SPI

D.

MSA

Full Access
Question # 22

Which items belong to the optical layer path in the path hierarchy of the WDM network?

A.

OTS

B.

OMS

C.

OCH

D.

OTU

Full Access
Question # 23

The 802.1Q tag header contains a two-byte TPID. Which of the following is its standard value?

A.

8100

B.

8847

C.

8147

D.

88A8

Full Access
Question # 24

Which of the following statements is incorrect about the optical layer interfaces OTM-nm and OTM-nrm of OTN?

A.

n represents the number of wavelengths carried by the maximum capacity,

B.

m represents the rate. Value can be 1.2 or 3.

C.

r means OTM without OSC function

D.

OTM-nr.m with OSC signal is OTM-nm.

Full Access
Question # 25

In order to determine whether the optical fiber lines and connectors on the wavelength division side are normal, which of the following loopback methods is most suitable?

A.

Client-side outer loopback

B.

Client-side Inloop

C.

WDM side outer loopback

D.

WDM side inner loopback

Full Access
Question # 26

When the PTN device forwards, how many bits does the MAC address have?

A.

32

B.

46

C.

48

D.

64

Full Access
Question # 27

When the device reports the PW_APS_DEGRADED alarm, what is the problem with the LTE service carried by the station?

A.

Business interruption

B.

One of the working protection channels fails

C.

The working protection channel is invalid

D.

None of the working protection channels fail

Full Access
Question # 28

The ARP protocol is a broadcast-based protocol through which the host can dynamically discover the MAC address corresponding to an address.

A.

True

B.

False

Full Access
Question # 29

Create an ETH private line service in the PTN network, and connect an Ethernet tester to the UNI port for RFC2544 testing. The instrument shows that the current port has only sending traffic

and no receiving traffic. What are the possible reasons?

A.

The VLAN on the Ethernet tester is inconsistent with the service WLAN

B.

The remote UNI port of the test service on the PTN is not configured with inner loopback

C.

The instrument optical module does not match the equipment optical module

D.

The PTN side limits the service rate

Full Access
Question # 30

In the PTN network, how many CES services can a PW carry at most?

A.

Article 1

B.

Article 2

C.

Article 5

D.

innumerable

Full Access
Question # 31

Which of the following operations need to be done before querying the bit error and optical power on the tube, otherwise the corresponding data cannot be queried?

A.

Create a logical fiber

B.

Configuration Data

C.

Enable NE performance monitoring time

D.

Synchronizing network metadata

Full Access
Question # 32

What options are included in the role of the control word in PWE3?

A.

Carry the sequence number forwarded by the packet

B.

Fill the message to prevent the message from being too short

C.

Carrying Layer 2 frame header control information

D.

Carry MPLS labels

Full Access
Question # 33

In the PTN network, what are the parameters for measuring QOS?

A.

Delay

B.

Jitter

C.

Bandwidth

D.

Packet Loss Rate

E.

Bit Error Rate

Full Access
Question # 34

When creating a static TUNNEL, you need to specify the interface of the next hop. Which is the displayed address of the next hop?

A.

NEIP

B.

NE LSR-IP

C.

Next-hop interface IP

D.

does not involve

Full Access
Question # 35

When using OptiX Datacollector to collect data, it can be collected by network element, which means to collect the fault data of all boards below the network element, or it can be collected by single board to collect

the fault data of a single board under the network element.

A.

True

B.

False

Full Access
Question # 36

In the PTN network, the 802.1Q label header contains a 2-byte TPID. Which of the following is its standard value?

A.

8100

B.

8847

C.

8147

D.

88A8

Full Access
Question # 37

According to the deployment plan of the existing network, which protocol does not need to be deployed for the interconnection between PTN equipment and SGW?

A.

VRRP

B.

IP/VPN Hybrid FRR

C.

ETH-Trunk

D.

BFD

Full Access
Question # 38

When the data link layer uses Ethernet, the encapsulation format of the data frame includes the destination MAC, source MAC, TYPE, and FCS fields. When the value of the TYPE field is 0x0806,

it indicates that the encapsulated inner packet is which of the following protocols?

A.

IP

B.

IPX

C.

ARP

D.

ICMP

Full Access
Question # 39

When PTN carries LTE services, it forwards packets based on MPLS label switching. In the MPLS label, which identification field can be used as a PTN to distinguish the label

at the bottom of the stack?

A.

Label ID

B.

BS

C.

EXP

D.

TTL

Full Access
Question # 40

In which layer of overhead is the segment monitoring overhead SM located?

A.

OPDK

B.

ODUK

C.

OTUK

D.

OMS

Full Access
Question # 41

Which of the following alarms will be reported when a fiber cut test is performed on a common MSP ring?

A.

TUAIS

B.

R-LOS

C.

APSJNDI

D.

BD Status

Full Access
Question # 42

During device initialization and commissioning, which of the following configuration descriptions is incorrect?

A.

The snmp parameter of the network element needs to be the same as the configuration of the network management

B.

The DCN route of the NE needs to be associated with the VPN instance "_dcn_vpn-"

C.

NE management can only use GE0/0/0 interface

D.

The default network management 0SPF process number is 65534

Full Access
Question # 43

In the path hierarchy of the WDM network, which paths belong to the optical layer?

A.

OCH

B.

OTU

C.

OMS

D.

OTS

Full Access
Question # 44

What is wrong with the statement that PTN LTE carries static L3VPN?

A.

In state L3VPW, no signaling is required between PEs

B.

To manually establish a VPN peer (PTN LTE bearer solution adopts fullmesh structure)

C.

Manually configure a static route destined for the user-side network segment on the PE in the static L3VPN

D.

The U200 automatically generates a user-side static route according to the VPNPeer relationship and the user-side (SGW-side) route

Full Access
Question # 45

During the debugging of the SDH system, if the E1 port reports a T-ALOS alarm, which of the following actions are meaningful?

A.

Check the E1 wire between D75 and DDF connector

B.

Check the DDF rack connector

C.

Check the business configuration

D.

Check whether the E1 port has loopback

Full Access
Question # 46

The key technology in the PTN network is IP/MPLS technology. How many levels can MPLS labels be nested?

A.

1st floor

B.

3 floors

C.

10 floors

D.

Theoretically infinite nesting

Full Access
Question # 47

Which of the following does not belong to the multi-level connection monitoring mode of OTN

A.

Overlap Mode

B.

Cascading Mode

C.

Nested Mode

D.

Punch-Through Mode

Full Access
Question # 48

Which of the following descriptions about network protection switching test is wrong?

A.

Before testing, you need to set the 1:1 linear multiplex section protection mode to single-ended switching.

B.

During the protection switching of the linear multiplex section, the NE reports the APS_INDI and MS_APS_INDI_EX alarms

C.

SNCP protection is configured. When the laser of the interface connected to the opposite end is turned off, observe the SDH analyzer of the local end.

D.

There are two methods for testing the protection switching of the multiplex section: the single-ended loopback test method and the double-ended hanging meter

test method

Full Access