Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H35-260 - HCSA-Field-Transmission & PTN V1.0

Page: 3 / 10
Total 326 questions

During the normal operation of the network, the service channel protected by ODUK SNCP generates a condition for triggering protection switching, and the service has been automatically switched to the protection channel. When the fault

of the working channel is eliminated, the service cannot be automatically restored to the working channel.

A.

The SNCP service type is inconsistent with the service scenario requirements

B.

Protection group 'Recovery Mode' is 'Non-Recovery'

C.

A small number of bit errors occur in the working channel

D.

Manual switching, locking switching or forced switching commands are implemented artificially

E.

When the working channel is normal, the business needs to delay the "waiting for recovery time" and then switch from the protection channel to the working

channel.

When configuring the L3VPN service, which operation will cause the service configuration to fail?

A.

The IP address configured before the Layer 3 port is added to the UNI of the L3VPN

B.

Create the UNI port from the base station direction as a VLAN aggregation sub-interface

C.

Enable ARP proxy on VLAN aggregation sub-interfaces

D.

The IPs of the two service access ports in the direction of the base station are the same IP

VLANs are used to isolate Layer 2 broadcast domains. Which of the descriptions of VLANs are correct?

A.

VLAN technology follows IEEE802.1Q standard

B.

The VLANID of the school uniform is 12 bits in total, and the value range of the configurable VLAN ID is 0-4095

C.

The value of TPID is 0x8100, which can be changed and can be set arbitrarily without affecting the business

D.

The priority field in vlan has a total of 3 bits. The priority value is 0-7. The higher the value, the higher the

priority.

Set up the alarm to report automatically, and report the alarm on the device side immediately after the alarm is generated. The alarm board pops up on the network management system. The user can view the alarm information in the alarm board, and does not need to

actively search for words. Unnecessary alarms can be set to not be automatically reported. At this time, the alarm will no longer be reported to the network, even if the synchronization operation is performed.

A.

True

B.

False

Which of the following statements about 802.1Q is wrong?

A.

The TPID value in the 802.1Q Ethernet frame structure is 8100

B.

In theory, the value range of VLAN ID is 0-4095

C.

There are only 4 VLAN priorities in the 802.1Q Ethernet frame structure

D.

802.1Q Ethernet frames are 4 bytes longer than normal Ethernet frames

Which of the following options is not the cause of the R-LOF alarm?

A.

The received signal is attenuated too much

B.

The signal sent by the peer station has no frame structure

C.

The receiving direction of the board is faulty

D.

Broken fiber

Which of the following items are the main functions of the U2000 network management?

A.

Topology Management

B.

Performance Management

C.

Alarm Management

D.

End-to-end business management

E.

Resource management

Which of the following descriptions are correct?

A.

CD1 can access and process 2 channelized STM-1 services

B.

L12 interface board can be installed in the slot of OpiX PTN 1900

C.

EFG2 can provide 2 GE electrical ports

D.

L12 can provide 16 E1 interfaces

Regarding the IS-IS backbone area, which of the following statements are correct?

A.

It is composed of all L2 routers (including L1/L2)

B.

Can be discontinuous

C.

For inter-area routing

D.

Identified with the area aea0

IEEE 802.1Q defines the structure of VLAN tags, including TPID, PRI, CR, and VLAN ID. Which of the following is used to classify service

priorities?

A.

VLAN ID

B.

CR

C.

PRI

D.

TPID