【单选题】
光缆在敷设时因受到扭曲和弯曲时,会使边缘光纤收到的挤压加重,造成损耗的( )___
A. 减小
B. 增大
C. 变化不确定
D. 不变
E.
F.
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
光链路衰减测试使用的仪表是( )___
A. 光源、光功率计
B. OTDR
C. 三波长光功率计
D. 红光源
E.
F.
【单选题】
光网络网管,采用成熟的三层标准客户端-服务器端(Client-Server)结构的有( )___
A. NES
B. T2000
C. RMS
D. RMS+
E.
F.
【单选题】
对没有设定为白动上报的报警类型,需要通过 的方式来查询告警___
A. 告警浏览
B. 告警核对
C. 告警确认
D. 告警同步
E.
F.
【单选题】
光纤到户的英文缩写为( )___
A. FTTB
B. FTTN
C. FTTC
D. FTTH
E.
F.
【单选题】
devcfg中的逻辑配置不包括以下个部分( )___
A. 网块
B. 网元
C. 组
D. 单盘
E.
F.
【单选题】
互联网电视业务是基于家庭宽带网络,以( )智能机顶盒连接电视机或大屏显示器等显示终端,向宽带用户提供高清视频节目.___
A. Java
B. Android
C. IOS
D. 塞班
E.
F.
【单选题】
华为OLT的PON单板更换方法是( )___
A. 不同名称、端口数量相同的单板可以随意替换,但需要手工确认
B. 不同名称的单板不能直接替换
C. GPON单板可以直接换成EPON单板
D. 多端口的单板可以直接替换少端口单板
E.
F.
【单选题】
华为新开局MDU需要在OLT上配置对应的线路模板,其中对于gemport的配置描述正确的是( )___
A. 一个gemport只能绑定一个tcont
B. 一个gemport只能mapping一个vlan或优先级
C. 一个tcont只能绑定一个genport
D. 一个gemport可以mapping多个vlan或优先级
E.
F.
【单选题】
徽章式工号牌应该佩戴在哪个位置( )___
A. 左胸上口袋处或不低于衬衫第三粒钮扣处
B. 右胸上口袋处
C. 右胸上口袋处或不低于衬衫第三粒钮扣处
D. 左胸上口袋处
E.
F.
【单选题】
机房安全管理办法中,哪些不能带入机房内( )___
A. 单板
B. 电脑
C. 网线
D. 矿泉水
E.
F.
【单选题】
机柜侧面与墙的距离不小于( )___
A. 5M
B. 2M
C. 3M
D. 1M
E.
F.
【单选题】
基于IP地址来进行数据包选路的过程发生在TCP/IP模型里的哪层?___
A. 应用层
B. 传输层
C. 网络层
D. 数据链路层
E.
F.
【单选题】
集团客户投诉受理热线受理客户投诉后,对( )业务故障,如涉及多个部门、多个地市公司,则无需进行预判断即可分派给所有相关部门同时处理.___
A. AAA级
B. A级
C. 普通级
D.
E.
F.
【单选题】
对于07ONU的每一个FE口最多可以配置多少条UNTAG业务。( )___
A. 1条
B. 2条
C. 3条
D. 16条
E.
F.
【单选题】
集团客户投诉受理热线为7×24小时投诉受理热线,受理( )客户的投诉.___
A. 金牌级
B. AAA级
C. 重要级
D. 所有级别
E.
F.
【单选题】
家庭客户代维界面传输维护界面中,是以什么设备为分界.( )___
A. 上联站点的ODF架
B. 进入小区的第一级光交箱
C. ODF架
D. 进入小区的第一级光交箱或ODF架
E.
F.
【单选题】
DHCP标准流程分为( )个步骤.___
A. 1
B. 2
C. 3
D. 4
E.
F.
【单选题】
家庭客户代维界面客户信息点维护界面中,是以什么设备为分界点.( )___
A. ODF架
B. 客户信息点
C. ONU
D. OLT
E.
F.
【单选题】
家庭宽带日常巡检中后台数据验证不符合巡检要求的是( )___
A. IT、传输等网管数据应正常、可监控。
B. 现场网络资源信息、业务信息应和资料一致;
C. 可不检查资源管理系统项目信息是否录入
D. 客户的联系人、联系方式等信息应与资料一致
E.
F.
【单选题】
家庭宽带日常巡检中设备检查工作内容包括( )___
A. 检查设备指示灯是否正常显示
B. 检查设备的保修日期
C. 检查FTTH ONT是否正常
D. 检查标签是否合格
E.
F.
【单选题】
家庭宽带业务服务支撑工作主要分为业务管理与( )两部分.___
A. 生产操作
B. 上门装机
C. 故障处理
D. 客户预约
E.
F.
【单选题】
家庭宽带装机过程中,遇到无户线小区必须采用( )制的户线布放原则.___
A. 一户一线
B. 一户二线
C. 一线二户
D. 一线三户
E.
F.
【单选题】
检验项目工作是否完成,需要使用( )___
A. 项目计划
B. WBS(工作任务分解表)
C. 项目管理计划
D. 项目要求
E.
F.
【单选题】
交直流电源线及信号线应分开布放,避免在同一线束内;无法避开同一路由时,至少要间隔( )以上.___
A. 5CM
B. 10CM
C. 15CM
D. 3CM
E.
F.
【单选题】
对于AAA等级数据专线的组网要求说法错误的是( )___
A. 客户侧接入:双端物理双路由
B. 客户侧设备电源具有1+1 保护的双电源模块,客户侧设备具备220V/-48V两种电源可选输入接口
C. 接入侧/客户侧设备可监控
D. 设备可采用台式或壁挂式安装方式
E.
F.
【单选题】
接入网丢包率参考值,KPI指标集要求 () ___
A. ≤0.05%
B. ≤0.1%
C. ≤0.2%
D. ≤0.5%
E.
F.
【单选题】
经过配置中心配置后的客户端软件可以直接拷贝到其他电脑上使用,要删除的有( )___
A. tools
B. ums-clnt\temp
C. ums-clnt
D. jdk-windows
E.
F.
【单选题】
局域网中适用于100Mbps高速传输的双绞线是( )___
A. 五类双绞线
B. 四类双绞线
C. 三类双绞线
D. 简单双绞线
E.
F.
【单选题】
Dtbackup中导出24小时历史性能应该选择的是( )___
A. alarmhis
B. pmhis15
C. pmhis24
D. user
E.
F.
【单选题】
看本机IP地址信息的命令是( )___
A. PING
B. TELNET
C. TRACERT
D. IPCONFIG
E.
F.
【单选题】
客户服务中心设立7×24小时集团客户投诉受理热线( ),向集团客户提供电话支持,受理集团客户的故障投诉.___
A. 10086-8
B. 10086-1
C. 4001008609
D. 4001008608
E.
F.
【单选题】
宽带拨号691表示的含义是( )___
A. 线路故障
B. 网线为连接二层链路不通
C. MODEM故障
D. 用户名密码错误
E.
F.
【单选题】
宽带拨号报错678是( )___
A. 拨号文件受损
B. 用户名密码错误
C. 本地网卡被禁用
D. 远程计算机没有响应
E.
F.
【单选题】
宽带拨号与用户名密码相关的报错有( )___
A. 619、691、718
B. 678、691、718
C. 619、718、723
D. 678、691、723
E.
F.
【单选题】
民用照明电路电压是以下哪种( )___
A. 交流电压220伏
B. 交流电压280伏
C. 直流电压220伏
D. 交流电压320伏
E.
F.
【单选题】
___
A. 客户侧接入:双端物理双路由
B. 客户侧设备电源具有1+1 保护的双电源模块,客户侧设备具备220V/-48V两种电源可选输入接口
C. 接入侧/客户侧设备可监控
D. 设备可采用台式或壁挂式安装方式。
E.
F.
【单选题】
某个网络运行OSPF协议,并被分为3个区域,区域号分别为0,1,2,其中1和2都只和0相连。1区域是Stub区域。2区域是NSSA区域。那么: 。___
A. 0区域存在TYPE=7的LS因为0区域是骨干区域
B. 0区域,1区域都存在TYPE=7的LSA
C. 只有1区域不存在TYPE=7的LSA
D. 只有2区域存在TYPE=7的LSA
E.
F.
【单选题】
某家庭宽带用户使用路由器上网,必须在电脑本地网卡手动设置IP地址、掩码、网关、DNS后才能上网,最可能原因是( )___
A. 客户使用的网线质量太差,致使无法自动分配到IP地址
B. 路由器未启用DHCP服务器 功能
C. 客户电脑网卡故障,无法自动获取IP地址
D. 路由器性能太差、连接的用户太多,自动分配不了IP地址
E.
F.
【单选题】
目前通信光缆大多采用( )防止水和潮气进入光缆.___
A. 充电
B. 阻水油膏
C. 充气
D. 其他
E.
F.
【单选题】
哪个部门负责在资源管理系统上对录入情况进行检查,主要核查录入数据完整性及准确性.( )___
A. 市场部门
B. 维护部门
C. 工程建设部门
D. 财务部门
E.
F.
推荐试题
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
A. 4
B. 3
C. 2
D. 5
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
A. 2
B. 3
C. 4
D. 5
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack