Winter Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Huawei H35-211_V2.5 Dumps Questions Answers

HCIP-Access V2.5 Questions and Answers

Question 1

What can cause erratic display in IPTV programs?

Options:

A.

The receive or transmit optical power of the device is at a critical value.

B.

Some key frames are lost during program compression.

C.

A rate limit is configured on the device.

D.

Some key frames are lost during line transmission.

Buy Now
Question 2

(Radio) To improve link reliability, the LT device uses two upstream ports 0/19/0 and 0/20/0 to configure a timedelay protection group. Which of the following commands is optional?

Options:

A.

huawei(config)#interface giu 0/19huawei(config-if-giu-0/19)#offline-tx-off-time 0 500

B.

huawei(protect-group-0)#protect-group member port 0/19/0 role work

C.

huawei(protect-group-0)#protect-group enable

D.

huawei(config)#protect-group 0 protect-target sth-nni port workmode timedelay

Question 3

In the upstream direction of the OLT, link aggregation can be used to improve bandwidth and reliability. Which OLT uplink aggregation modes are supported?

Options:

A.

Automatic

B.

Manual

C.

Static

D.

Dynamic

Question 4

(Single-choice) HSI service uses VLAN tags to bind users precisely. If there are 5K FTTH users hanging under the OLT, which VLAN switching scheme is recommended?

Options:

A.

User VLAN → C-VLAN → S+C-VLAN

B.

S+C → S+C

C.

C → S

D.

C → S+C

E.

C → S+C

Question 5

For the packets from the client side, the flow matching is performed preferentially according to the VLAN tag carried in the packets. If the matching fails and the TLS service flow is deployed on the device, the packets are matched to the TLS service flow.

Options:

A.

TRUE

B.

FALSE

Question 6

The (radio) prerequisites for eSight to automatically discover OLT and MXU devices by IP address are not included

Options:

A.

eSight and the device need to be on the same network segment, otherwise the device cannot be discovered using the ARP broadcast protocol.

B.

You already have the operation permission of "Resource Access".

C.

eSight and the device can be routed to communicate (ping each other).

D.

The SNMP parameters on the eSight side have been configured and are aligned with the device side SNMP parameters.

Question 7

(Single choice) The upstream wavelength of 10G-EPON is:

Options:

A.

1577 nm

B.

1270 nm (symmetric)

C.

1310 nm (asymmetric)

D.

1490 nm

Question 8

In Huawei U2000, when adding network elements, you can only add them one-by-one while accessing each network element.

Options:

A.

Wrong

B.

Right

Question 9

Which of the following protocols is used to manage multicast member relationships?

Options:

A.

PIM-DM

B.

IGMP

C.

MSDP

D.

PIM-SM

Question 10

Sequence of upstream QoS processing on the OLT:

Options:

A.

Traffic classification > Marking > ACL policy > Congestion avoidance > Congestion management

B.

Marking > Traffic classification > Congestion avoidance > Traffic policing > Congestion management

C.

Traffic classification > Marking > Congestion avoidance > Traffic policing > Congestion management

D.

Traffic classification > Marking > Traffic policing > Congestion avoidance > Congestion management

Question 11

When the Type C dual-home protection linkage uplink detection is enabled, if the OLT or the OLT uplink fails, the Type C dual-home protection can switch over to another OLT.

Options:

A.

True

B.

False

Question 12

(Single choice) The following statement about the PITP protocol is incorrect

Options:

A.

The PITP protocol includes PITP P mode and PITP V mode

B.

The purpose of the PITP feature is to provide the upper authentication server with the physical location information of the access user, and the BRAS device can realize the user account and the press position after obtaining the user access location information

C.

Bind the authentication of the information to avoid the theft and roaming of the user account

D.

In PITP V mode, the user's physical location information is added to the PPPoE message sent by the user side to cooperate with the upper-level server for user authentication

E.

PITP P mode can also be called PPPoE+ mode

Question 13

The number of users under the OLT can also determine whether the VLAN is single-layer or dual-layer. Single-layer VLANs can be used when the number of users is small; dual-layer VLANs must be used when services need to be distinguished and the number of users is close to ( ).

Options:

A.

2K

B.

4K

C.

CS

D.

1K

Question 14

Compared with Type C dual-homing protection, which of the following statements about Type C single-homing protection are correct?

Options:

A.

Protects important services such as enterprise and base station private line access services.

B.

When the OLT or uplink of the OLT is faulty, services can be switched to the other OLT.

C.

If the OLT is faulty, services are interrupted.

D.

The networking is simple, and the OLT and ONU management is simple.

Question 15

The OLT is configured to use IGMP Version 2. When the OLT receives an IGMPv3 Join (Report) message forwarded from an ONT, what action will it take?

Options:

A.

Normal forwarding

B.

Send a specific-group query message

C.

Send a general (universal) group query message

D.

Discard directly

Question 16

Type B protection provides redundant protection for both OLT PON ports and feeder (backbone) fibers. When the OLT PON port or feeder fiber fails, manually switch to the other optical path.

Options:

A.

True

B.

False

Question 17

(Multi-select) eSight is network management software positioned for enterprise networks and can view ONT device details, including which of the following?

Options:

A.

ONT port information

B.

Speed

C.

Optical module temperature

D.

The optical module transmit power

Question 18

In Layer 2 multicast, how many multicast IP addresses can a multicast MAC address correspond to?

Options:

A.

8

B.

16

C.

24

D.

32

Question 19

The number of users under the OLT can also determine whether the VLAN is single-layer or dual-layer VLAN. Single-layer VLANs can be used when the number of users is small, and dual-layer VLANs must be used when the need to distinguish services and the number of users is second to ().

Options:

A.

2K

B.

4K

C.

CS

D.

1K

Question 20

(Multi-select) In U2000, adding a line template to map user traffic flows to GEM Ports supports which mapping modes?

Options:

A.

MAC

B.

PORT

C.

VLAN

D.

802.1p

Question 21

When the H.248 protocol is used to deploy the VoIP service, the registration information sent by the MG to the MGC contains the following information:

Services {Method=Restart Reason=[901]}

Which command can trigger the information?

Options:

A.

ONT re-register

B.

Board restart

C.

Reset coldstart

D.

Reboot system

Question 22

(Radio) The upstream (ascending) wavelength of the 10G EPON system is:

Options:

A.

1577 nm

B.

1270 nm (symmetric)

C.

1310 nm (asymmetric)

D.

1490 nm

Question 23

Different DBA need to be configured for different services. Drag the DBA to corresponding services. (Score only when all the answers are correct.)

Options:

Question 24

(Multiple choice) Which of the following measures can be adopted by GPON for traffic control?

Options:

A.

GEM-CAR

B.

GEM mapping

C.

Flow-CAR

D.

T-CONT-CAR

Question 25

The establishment, maintenance, and teardown of the signaling path between a SIP user and servers are done through an exchange of a series of SIP messages. Therefore, every piece of information in a SIP message is unique and no header information value ever appears multiple times.

Options:

A.

wrong

B.

Right

Question 26

(Single choice) The following statement about defending MAC Spoofing is wrong:

Options:

A.

MAC Anti-MAC-Spoofing features are mutually exclusive with WMAC, SC, PPPoE-SMAC features at the VLAN level

B.

After the Anti-MAC-Spoofing function is enabled, the system automatically implements dynamic binding of the MAC address to the service flow

C.

After enabling the Anti-MAC-Spoofing function, for IPoE users using fixed IP, the user needs to be statically configured

D.

Turning off the Anti-MAC-Spoofing function can only remove the fixed table items, which does not affect the user’s service application, but the service forwarding plane will be interrupted

Question 27

(Single) A total of 100 multicast users on an OLT are watching 20 multicast programs. Assuming that each multicast program occupies 2 Mbit/s bandwidth, how much multicast traffic is currently on the OLT upstream port?

Options:

A.

200 Mbit/s

B.

100 Mbit/s

C.

40 Mbit/s

D.

50 Mbit/s

Question 28

In a campus project, XGS-PON is used; ONUs backhaul APs via a 1:16 splitter, but only 12 APs are actually connected per splitter. What is the downstream concurrent bandwidth per AP (Mbit/s)?

Options:

A.

About 600

B.

About 300

C.

About 800

D.

About 400

Question 29

(Radio) A power access service deploys GPON Type C dual-attribution protection, and the protection group is bound to the uplink Ethernet-port status on the OLT. When the Ethernet port associated with the protection group on the OLT goes Down, the following description is incorrect.

Options:

A.

The state of the ONU-side work port changes to standby

B.

The OLT detects the ONU uplink state change

C.

After switchover, the ONU’s service is sent to the OLT through the protect port (service traffic follows the protect path)

D.

The ONU detects the link failure and triggers the protection switchover

Question 30

The protection scope of GPON Type B dual-homing protection covers ( ).

Options:

A.

Active and standby backbone optical fibers

B.

Active and standby OLTs

C.

Active and standby PON ports of the OLT

D.

Active and standby branch optical fibers

Question 31

(Radio) In the ACL, if you need to filter packets by source IP, destination IP, and port number, the ACL number template to create is:

Options:

A.

5000–5999

B.

3000–3999

C.

2000–2999

D.

4000–4999

Question 32

(Single-choice) An IPTV user reports the TV cannot be watched. After enabling OLT debug for multicast/IGMP, the printed information (authorization result) indicates the conclusion below. This can be judged by the results of the query:

Options:

A.

The PON port multicast bandwidth is insufficient

B.

The user does not have permission to watch the show

C.

IGMP Snooping failure

D.

User bandwidth validation failed

Question 33

If the ONT zero-touch provisioning function is enabled on eSight, you can configure multiple service profiles. Which parameters can be set on the Multi-Service Profile Management tab page?

Options:

A.

Default VLAN

B.

ONU type

C.

Number of Ethernet ports

D.

VLAN

E.

Voice VLAN

Question 34

Assume that there are 500 broadband users with a concurrency rate of 40%, penetration rate of 50%, online bandwidth of 4 Mbit/s, duty cycle of 12.5%, 1 channel, and coverage rate of 70%. Then the bandwidth is 35 Mbit/s.

Options:

A.

TRUE

B.

FALSE

Question 35

(Radio) The 10G GPON system uses XGEM frames to encapsulate data, and the Port-ID is defined in the XGEM header as () bits.

Options:

A.

18

B.

12

C.

14

D.

16