Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

H35-260 Sample Questions Answers

Questions 4

Which of the following bridges are used to forward data based on the MAC address and VLAN ID carried in the data?

Options:

A.

802.1a

B.

802.1d

C.

802.1q

D.

802.11ab

Buy Now
Questions 5

Which of the following descriptions is correct?

Options:

A.

SAToP encapsulation type processes the CES service by encapsulating the 32 time slots in the E1 frame as a whole and then transparently transmitting it to the opposite end

B.

SAToP supports time division suppression

C.

OptiX PTN supports encapsulating E1 frames of different connections into one PW

D.

One STM-1 channel contains 64 VC12 time slots

Buy Now
Questions 6

The.0ptiX0SN 8800 T64 system is equipped with 4 PIU boards, and uses 1+1 hot backup mode to supply power to the system.

Options:

A.

True

B.

False

Buy Now
Questions 7

The PWE3 technology in the PTN network often uses VLAN. Where is the VLAN in the Ethernet packet?

Options:

A.

Before SMAC and DMAC addresses

B.

Between SMAC and DMAC addresses

C.

After SMAC. and DMAC addresses

D.

not fixed

Buy Now
Questions 8

Which of the following is wrong about the comparison between Raman amplifiers and EDFAs?

Options:

A.

The Raman amplifier selects different pump sources to amplify signals in different bands, so the Raman amplifier has no gain bandwidth limit in theory, while the EDFA has a range of gain bandwidth

B.

The equivalent noise figure of the Raman amplifier is smaller than that of the EDFA

C.

The gain calculation/testing method of Raman amplifier and EDFA is consistent, both are "gain = output power - input power"

D.

The gain medium of Raman amplifier is transmission fiber: while the gain medium of EDFA is EDF (Erbium Doped Fiber)

Buy Now
Questions 9

What options are included in the role of the control word in PWE3?

Options:

A.

Carry the sequence number forwarded by the packet

B.

Fill the message to prevent the message from being too short

C.

Carrying Layer 2 frame header control information

D.

Carry MPLS labels

Buy Now
Questions 10

To create a unicast BFD session between two IP addresses in a PIN network, which of the following must be satisfied?

Options:

A.

IP address routing is reachable

B.

The message sending interval of both parties is the same

C.

The "remote identifier" of the local end and the "local identifier" of the remote end

D.

IP addresses at both ends must be in the same network

segment

Buy Now
Questions 11

CAR is deployed on PTN equipment. Which of the following descriptions is wrong?

Options:

A.

The value of PIR is required to be greater than or equal to CIR

B.

The unit of CBS/PBS is Bytes

C.

CBS bursts are marked in yellow

D.

Supports setting the processing mode for CAR-processed packets

Buy Now
Questions 12

The PTN3900 device needs to complete the access and processing of E1 signals through the processing board, service daughter card, and interface board. Which of the following boards is not involved in the

work?

Options:

A.

CD1

B.

MQ1

C.

MP1

D.

D12/D75

Buy Now
Questions 13

Which of the following layers of overhead belong to the electrical layer overhead of OTN

Options:

A.

OPUK

B.

ODUK

C.

OCH

D.

OTUK

Buy Now
Questions 14

Which of the following statements about EDFA is false?

Options:

A.

The amplification of optical signal by EDFA is pure optical amplification, no need for photoelectric conversion

B.

Noise figure, saturated output power, gain flatness, gain, etc. are all important parameters to characterize EDFA

C.

1510nm optical monitoring channel can be effectively amplified by EDFA

D.

When the output power of the EDFA reaches saturation, increase the input optical power, and the gain of the EDFA will decrease.

Buy Now
Questions 15

Which of the following types of protection is electrical layer protection?

Options:

A.

Optical Line Protection QLP

B.

Tributary SNCP Protection

C.

Client side 1+1 protection

D.

+1 protection inside the board

Buy Now
Questions 16

Which of the following is the service board type Y of MSTP equipment

Options:

A.

Interface board

B.

Service Processing Board

C.

Service processing board with interface

D.

Auxiliary board

Buy Now
Questions 17

The ETH_UWK_DOWN alarm indicates that the network port connection is faulty. The possible reasons do not include which of the following?

Options:

A.

The working modes of the sending and receiving ends are inconsistent

B.

Link failure

C.

Peer device failure

D.

There is no light received at the local end

Buy Now
Questions 18

Which of the items are unreasonable to configure the default route on the PTN device in the LTE solution?

Options:

A.

The default route is configured on the L2/3 master node, and the next-hop points to the L3 master node

B.

A default route is configured on the L2/L3 standby node, and the next hop points to the L3 master node

C.

On the L3 raw node, configure a default route with the next hop pointing to the main L2/L3 node

D.

Configure the default route on the standby point, and the next hop points to the standby L2/L3 node

Buy Now
Questions 19

Regarding the IS-IS backbone area, which of the following statements are correct?

Options:

A.

It is composed of all L2 routers (including L1/L2)

B.

Can be discontinuous

C.

For inter-area routing

D.

Identified with the area aea0

Buy Now
Questions 20

For ODUK SNCP protection, which of the following types does not apply to the pass-through site being an electrical relay site?

Options:

A.

SNC/I

B.

SNC/N

C.

SNC/S and SNCN

D.

SNC/S

Buy Now
Questions 21

In the PTN LTE solution, what operations will the L2/L3 node perform on the service data sent from the base station to the EPC?

Options:

A.

Strip the header of the Ethernet frame encapsulated by the base station

B.

Match the routing table to the EPC

C.

Reseal the PW label

D.

Encapsulate the Tunnel label

Buy Now
Questions 22

When PTN carries LTE services, it forwards packets based on MPLS label switching. In the MPLS label, which identification field can be used as a PTN to distinguish the label

at the bottom of the stack?

Options:

A.

Label ID

B.

BS

C.

EXP

D.

TTL

Buy Now
Questions 23

When configuring SxCS board for OSN3500. Which of the following is the access capacity of a fully configured subrack?

Options:

A.

35G

B.

58.75G

C.

80G

D.

155G

Buy Now
Questions 24

In PTN, LSP is created statically. Which items are correct in the following description about LSP creation?

Options:

A.

The value of the outgoing label of the previous node and the incoming label of the next node are equal

B.

Multiple labels can be assigned to the same A FEC

C.

Tunnel is being created, PHP is not enabled

D.

The label values on different nodes of the LSP cannot be the same

Buy Now
Questions 25

DCM optical power debugging requires the input of DCM to be no greater than which of the following values?

Options:

A.

-2

B.

-3

C.

-4

D.

-5

Translated from Chinese (Simplified) to English - www.onlinedoctranslator.com

Buy Now
Questions 26

The services carried by PWE3 need to be sensed by the internal nodes of the PSM network.

Options:

A.

True

B.

False

Buy Now
Questions 27

IEEE 802.1Q defines the structure of VLAN tags, including TPID, PRI, CR, and VLAN ID. Which of the following is used to classify service

priorities?

Options:

A.

VLAN ID

B.

CR

C.

PRI

D.

TPID

Buy Now
Questions 28

The M40 board has 2 waves of access, and the power of each wave is -4dBm. So which of the following values is the power of the M40 output port? (M40 insertion loss is 6.5dBm)

Options:

A.

-8.5

B.

-1

C.

-10.5

D.

-7.5

Buy Now
Questions 29

Which networking type is the main networking type in the metro WDM network?

Options:

A.

Point-to-point networking

B.

Chain networking

C.

Ring Networking

D.

Mesh networking

Buy Now
Questions 30

Any service cross-connect can only be configured in inter-board cross-connect, and does not require the participation of XCS boards

Options:

A.

True

B.

False

Buy Now
Questions 31

In the PTN network, the L3 node needs to learn the ARP message to forward the message to the SGW. What is the type of the ARP response message?

Options:

A.

Broadcast

B.

Unicast

C.

Multicast

D.

Multicast

Buy Now
Questions 32

When the optical cable between the FIU and the FIU is faulty, what are the optical layer alarms reported by the downstream station?

Options:

A.

MUT LOS

B.

OSC_LOS

C.

R_LOS

D.

OSC RDI

Buy Now
Questions 33

Which of the following technologies is used in the dynamic BGP MPLS L3VPN to distinguish the same IP address in different VPNs in the BGP protocol?

Options:

A.

VRF

B.

RD

C.

Export RT

D.

Import RT

Buy Now
Questions 34

optâ…¸ Datacollector supports black box fault data collection of multiple products. Which of the following products is not supported?

Options:

A.

NG SDH

B.

WDM

C.

ocs

D.

PTN

Buy Now
Questions 35

Can't log in after NE is created, what are the possible reasons?

Options:

A.

The NE user password is incorrect

B.

The NE user has logged in

C.

The communication between the network management and the network element is abnormal

D.

The time on the network element side and the network management side is different

Buy Now
Questions 36

Standard Ethernet frame length should not be less than 64 bytes. Which of the following factors would cause this limitation?

Options:

A.

Minimum transmission distance

B.

Maximum transmission distance

C.

Working Mechanism of Conflict Detection

D.

MAC address

Buy Now
Questions 37

The DWDM system has extremely high requirements on the stability of the light source. Which of the following factors will affect the stability of the light source?

Options:

A.

Temperature

B.

Drive Current

C.

Packaging

D.

Humidity

Buy Now
Questions 38

Which of the following operations need to be done before querying the bit error and optical power on the tube, otherwise the corresponding data cannot be queried?

Options:

A.

Create a logical fiber

B.

Configuration Data

C.

Enable NE performance monitoring time

D.

Synchronizing network metadata

Buy Now
Questions 39

When the device reports the PW_APS_DEGRADED alarm, what is the problem with the LTE service carried by the station?

Options:

A.

The working protection channel has a channel failure

B.

The working protection channels are invalid

C.

None of the working protection channels fail

D.

Business interruption

Buy Now
Questions 40

Which of the following protection types is not supported by the L302 board?

Options:

A.

0DU3 SNCP

B.

Tributary SNCP

C.

SW SNCP

D.

In-board 1+1

Buy Now
Questions 41

Qinia technology can be used when multiple users need to share the same VCTRUNK and use the same VLANID.

Options:

A.

True

B.

False

Buy Now
Questions 42

According to the IEEE 802JQ standard, where is the VLAN ID field on the Ethernet?

Options:

A.

Before source MAC address and destination MAC address

B.

Between the source MAC address and the destination MAC address

C.

After the source MA dog address and the destination MAC address

D.

not fixed

Buy Now
Questions 43

The key technology in the PTN network is IP/MPLS technology. How many levels can MPLS labels be nested?

Options:

A.

1st floor

B.

3 floors

C.

10 floors

D.

Theoretically infinite nesting

Buy Now
Questions 44

Which of the following descriptions about the PTN network deployment ring network intersecting ring are correct?

Options:

A.

Each ring operates independently, and when multiple rings intersect, they operate independently in pairs

B.

The intersection point requires business synchronization

C.

The intersection point requires business synchronization

D.

Once the business reaches the intersection, it will choose to cross the ring

Buy Now
Questions 45

What items are not included in the route advertisement of L3VPN

Options:

A.

Local CE to ingress PE routing information exchange

B.

Ingress PE to P routing information exchange

C.

Ingress PE to egress PE routing information exchange

D.

Egress PE to egress CE routing information

exchange

Buy Now
Questions 46

When the data link layer uses Ethernet, the encapsulation format of the data frame includes the destination MAC, source MAC, TYPE, and FCS fields. When the value of the TYPE field is 0x0806,

it indicates that the encapsulated inner packet is which of the following protocols?

Options:

A.

IP

B.

IPX

C.

ARP

D.

ICMP

Buy Now
Questions 47

Which of the following options is not the reason for the R-LOS alarm?

Options:

A.

Broken fiber

B.

Excessive line attenuation

C.

The laser at the transceiver end is damaged

D.

Frame failure

Buy Now
Questions 48

The pump laser is the energy source of the EDFA, and its function is to provide energy for the amplification of the optical signal. Which of the following wavelengths can be used as the output wavelength of the

pump source in the EDFA structure?

Options:

A.

980nm

B.

1510nm

C.

1480nm

D.

1310nm

Buy Now
Questions 49

Which of the following statements about the FEU board is false?

Options:

A.

The FIU board does not process monitoring information

B.

The FIU can complete the access and release of the OSC channel

C.

Using ESC, OTM station needs a FIU

D.

Using OSC, both OLA station and OADM station need two FIUs

Buy Now
Questions 50

During device initialization and commissioning, which of the following configuration descriptions is incorrect?

Options:

A.

The snmp parameter of the network element needs to be the same as the configuration of the network management

B.

The DCN route of the NE needs to be associated with the VPN instance "_dcn_vpn-"

C.

NE management can only use GE0/0/0 interface

D.

The default network management 0SPF process number is 65534

Buy Now
Questions 51

In the PIN LTE bearer solution, if the link between the core L3 PTN node and the SGW is faulty, what are the triggering detection mechanisms and protection mechanisms?

Options:

A.

MPLS OAM, SVPN FRR

B.

BFD, IP/VPN FRR

C.

BFD, VPN FRR

D.

MPLS OAM, IP/VPN FRR

Buy Now
Questions 52

The 1588V2 clock protocol can realize clock and time synchronization, and the working modes are OC, BC, TC.

Options:

A.

True

B.

False

Buy Now
Questions 53

Which of the following is the destination MAC address of the Layer 2 header of the data received by the PTN960 from the LTE base station?

Options:

A.

The user-side port MAC of the PTN device connected to the base station

B.

The network port MAC of the PTN device connected to the base station

C.

The MAC of the base station gateway L3VE on the L2/L3 node.

D.

The port MAC of the EPC device connected to the core L3PTN

Buy Now
Questions 54

Which of the following descriptions are correct?

Options:

A.

CD1 can access and process 2 channelized STM-1 services

B.

L12 interface board can be installed in the slot of OpiX PTN 1900

C.

EFG2 can provide 2 GE electrical ports

D.

L12 can provide 16 E1 interfaces

Buy Now
Questions 55

In the path hierarchy of the WDM network, which paths belong to the optical layer?

Options:

A.

OCH

B.

OTU

C.

OMS

D.

OTS

Buy Now
Questions 56

Using Huawei PTN7900 to carry the L3VPN service, there is no need to plan VPN peers between the two devices

Options:

A.

Between L2/L3PTN and L3PTN at the core layer

B.

Active and standby L2/L3PTN equipment rooms

C.

Between different L2/L3PTN and L3PTN sink node pairs

D.

Between L3PTNs at the core layer

Buy Now
Questions 57

Which of the following statements about ESD protection measures is false?

Options:

A.

All personnel entering the computer room should wear anti-static shoes, anti-static clothing, etc.

B.

Use anti-static tools, such as: anti-static wrists, anti-static tweezers, pullers, etc.

C.

Controlling humidity has little effect on reducing static electricity

D.

All conductors in the computer room must be grounded reliably, including computer terminals and other equipment, and an anti-static workbench must be set up

E.

Static sources such as non-anti-static plastic bags, non-anti-static bubble films, and rubber should be kept away from ESD sensitive devices and sensitive boards, at least 30cm away.

Buy Now
Questions 58

Compared with PDH, which of the following are the main advantages of SDH?

Options:

A.

Interface Specification

B.

Synchronous Multiplexing

C.

Operation and maintenance

D.

Strong responsiveness

E.

High frequency band utilization

Buy Now
Questions 59

In the MPLS-TPOAM architecture of PTN equipment, what are the functions of network performance maintenance?

Options:

A.

LB

B.

LM

C.

LT

D.

DM

Buy Now
Questions 60

On the U2000 network management, you can make an inner ring and an outer ring on the PTNE1 port to facilitate testing

Options:

A.

True

B.

False

Buy Now
Questions 61

When configuring LMSP, there are two switching modes: single turbulent cutting and inserting and double full switching. Single-ended switching does not require self-use protection

Options:

A.

True

B.

False

Buy Now
Questions 62

How many bits does the VLAN ID occupy in the Ethernet frame format marked with IEEE 802.1Q?

Options:

A.

8

B.

10

C.

12

D.

14

Buy Now
Questions 63

When configuring electrical layer crossing, what are the rules for time slot configuration?

Options:

A.

For the convenience of management and maintenance, it is recommended to set the time slot cutting mode to automatic mode

B.

For each board, the same time slot in the same direction cannot be used by multiple services at the same time

C.

For the same service, the time slots occupied by the receiving turbulence and the transmitting turbulence in one direction must be the same

D.

After changing the service type, there is no need to reset the service time slot

Buy Now
Questions 64

What are the possible reasons for the unsuccessful OCH creation by the path method?

Options:

A.

Missing service layer path

B.

Source, sink but inconsistent half-wavelength configuration

C.

The data on the device side and the remote side of the network are not synchronized

D.

The time on the device side and the network element side is not synchronized

Buy Now
Questions 65

During the normal operation of the network, the service channel protected by ODUK SNCP generates a condition for triggering protection switching, and the service has been automatically switched to the protection channel. When the fault

of the working channel is eliminated, the service cannot be automatically restored to the working channel.

Options:

A.

The SNCP service type is inconsistent with the service scenario requirements

B.

Protection group 'Recovery Mode' is 'Non-Recovery'

C.

A small number of bit errors occur in the working channel

D.

Manual switching, locking switching or forced switching commands are implemented artificially

E.

When the working channel is normal, the business needs to delay the "waiting for recovery time" and then switch from the protection channel to the working

channel.

Buy Now
Questions 66

When creating a static tunnel, you need to specify the interface of the next hop. Which is the displayed address of the next hop?

Options:

A.

NEIP

B.

NE LSR-ID

C.

Next-hop interface IP

D.

does not involve

Buy Now
Questions 67

In the SDH system, we can use the instrument to test the input jitter tolerance of the STM-N interface. Which of the following instruments can complete this function?

Options:

A.

Smartbits

B.

SDH Analyzer

C.

Spectrum analyzer

D.

Bit Error Tester

Buy Now
Questions 68

VLANs are used to isolate Layer 2 broadcast domains. Which of the descriptions of VLANs are correct?

Options:

A.

VLAN technology follows IEEE802.1Q standard

B.

The VLANID of the school uniform is 12 bits in total, and the value range of the configurable VLAN ID is 0-4095

C.

The value of TPID is 0x8100, which can be changed and can be set arbitrarily without affecting the business

D.

The priority field in vlan has a total of 3 bits. The priority value is 0-7. The higher the value, the higher the

priority.

Buy Now
Questions 69

Standard FEC, AFEC and HFEC techniques all increase the FEC overhead, and the coding gains achieved are progressively increased.

Options:

A.

True

B.

False

Buy Now
Questions 70

Create an ETH private line service in the PTN network, and connect an Ethernet tester to the UNI port for RFC2544 testing. The instrument shows that the current port has only sending traffic

and no receiving traffic. What are the possible reasons?

Options:

A.

The VLAN on the Ethernet tester is inconsistent with the service WLAN

B.

The remote UNI port of the test service on the PTN is not configured with inner loopback

C.

The instrument optical module does not match the equipment optical module

D.

The PTN side limits the service rate

Buy Now
Questions 71

OSN6800 equipment, ND2, TQX report the BUS_ERROR alarm after configuring the power cross-connect, what are the possible reasons?

Options:

A.

The crossover board, TQX board or ND2 board is faulty

B.

The TQX client side business type is set incorrectly

C.

Subrack Hardware Limitations

D.

Cross bus capacity is limited

Buy Now
Questions 72

When configuring GE services, the types of services in one direction can be different for the transmission and reception of a service.

Options:

A.

True

B.

False

Buy Now
Questions 73

Which of the following items belong to the debugging work of the playback system?

Options:

A.

Commissioning the protection function

B.

Commissioning feature function

C.

Debugging Errors

D.

Optical power commissioning

E.

Cabinet Installation

Buy Now
Questions 74

In the U2000 system, which of the following menus can be used to check the current optical power of the device?

Options:

A.

NE Manager>Board>Optical Power Management

B.

Click on the fiber and cable, right-click and select "Query related optical power"

C.

Configuration > Optical Power Management

D.

NE Manager > Interface Configuration > Query Optical Power

Buy Now
Questions 75

Which of the following protections are protected by electrical layer double transmission and selective reception?

Options:

A.

Client side 1+1 protection

B.

ODUK SNCP Protection

C.

SW SNCP Protection

D.

ODUK ring network protection

Buy Now
Questions 76

Which of the following light source technologies does the 100GOTU board use?

Options:

A.

Direct modulation light source

B.

Light source of EA modulation method

C.

MZ modulation light source

D.

Coherent reception modulation mode light source

Buy Now
Questions 77

The frame rate of STM-1, STM-4, STM-16, STM-64 signals are all the same 8000 frames/sec.

Options:

A.

True

B.

False

Buy Now
Questions 78

Which one is wrong in the description of hardware redundancy backup of PTN7900-32?

Options:

A.

SCA board 1+1 backup

B.

XCS board 6+1 backup

C.

3+3/4+4/5+5 backup of power supply

D.

Fan 1+1 Backup

Buy Now
Questions 79

When the NE reports the TUNNEL_APS_OUTAGE alarm, what does it mean?

Options:

A.

Tunnel protection group is degraded and the availability of the protection group is reduced

B.

The tunnel protection group is interrupted, and the bearer services are interrupted

C.

The tunnel protection group is switched, and the working channel is unavailable

D.

The tunnel protection group is switched and the protection channel is

unavailable

Buy Now
Questions 80

When the data is forwarded by the PTN device, when the value of the TYPE field of the Ethernet header is OxO8O0, which protocol is the encapsulated inner packet?

Options:

A.

ICMP

B.

IPX

C.

ARP

D.

IP

Buy Now
Questions 81

L--16.1 indicates the type of optical interface. Which of the following descriptions is correct?

Options:

A.

Short distance communication, the signal level is STM-1 and the working window is 1310nm

B.

Long distance communication, the signal level is STM-1 and the working window is 1310nm

C.

Short distance communication, the signal level is STM-16 and the working window is 1550nm

D.

Short-distance week-to-week communication, the signal level is STM-16 and the working window is 1310nm

Buy Now
Questions 82

Which of the following descriptions about electrical layer service configuration is wrong?

Options:

A.

When the OCh service path exists, create the Client path directly, and the NMS can automatically create the OTUk and ODUk paths

B.

When there is an OCh service path, you can first search for the OTUK path, create the ODUk service layer path, and then create the Client path

C.

When the OCh service path exists, directly create the ODUk path, and the network management can automatically create the OTUk path

D.

After the logical fiber connection is completed, no path search operation is required, and the OTS path and OMS path can automatically

generate the

Buy Now
Questions 83

What is wrong with the statement that PTN LTE carries static L3VPN?

Options:

A.

In state L3VPW, no signaling is required between PEs

B.

To manually establish a VPN peer (PTN LTE bearer solution adopts fullmesh structure)

C.

Manually configure a static route destined for the user-side network segment on the PE in the static L3VPN

D.

The U200 automatically generates a user-side static route according to the VPNPeer relationship and the user-side (SGW-side) route

Buy Now
Questions 84

The purpose of setting the upper and lower threshold alarms for performance monitoring through professional network management does not include which of the following?

Options:

A.

Easy to analyze historical traffic

B.

If the data exceeds the upper and lower limits, the alarm will be reported to the network management as soon as possible

C.

In the report, the data that exceeds the reading value can be identified by the red mark

D.

Facilitates quick troubleshooting

Buy Now
Questions 85

During the troubleshooting process, if you need to loopback the protected services carried by the NG WDM device, which of the following operations need to be performed first when performing the loopback

operation?

Options:

A.

Switch to the protection channel

B.

Lock on the current channel

C.

Test to see if the ring is normal

D.

Verify that the APS protocol is enabled

Buy Now
Questions 86

Regarding PW labels and tunnel labels, which of the following statements are correct?

Options:

A.

PW labels are mainly used to distinguish PWs, but for CES services, because CES services do not support aggregation, there is no need to use PW labels

B.

Tunnel label is mainly used for transmission in the tunnel, it mainly uses the tunnel label to establish MPLS tunnel

C.

They are all based on MPLs tags

D.

PW signing only needs negotiation between the source and sink network elements, and has nothing to do with the intermediate

tansit network elements

Buy Now
Questions 87

Which of the following detection methods can locate the fault point of LSP?

Options:

A.

MPLS Pin A.

B.

CC

C.

LT

D.

MPLS Tracert

Buy Now
Questions 88

After the optical cable is cut, the optical power is normal and there is no ETH_LOS alarm, but the TUNNEL_LOCV alarm is not cleared. What is the most likely cause?

Options:

A.

Equipment failure

B.

The optical cable fusion sequence is wrong

C.

The fiber optic cable is blocked

D.

Different steps to alert

Buy Now
Questions 89

When creating a static TUNNEL, you need to specify the interface of the next hop. Which is the displayed address of the next hop?

Options:

A.

NEIP

B.

NE LSR-IP

C.

Next-hop interface IP

D.

does not involve

Buy Now
Questions 90

What are the possible reasons for the failure of route calculation by the optical layer path (OCh level)?

Options:

A.

The optical fiber is connected incorrectly. The wavelength of the WDM side port of the OTU board is inconsistent with the wavelength of the optical crossover.

B.

Network layer OTS path is missing

C.

The fiber attenuation between the TDC and RDC ports of the OAU board is too

large

Buy Now
Questions 91

Set up the alarm to report automatically, and report the alarm on the device side immediately after the alarm is generated. The alarm board pops up on the network management system. The user can view the alarm information in the alarm board, and does not need to

actively search for words. Unnecessary alarms can be set to not be automatically reported. At this time, the alarm will no longer be reported to the network, even if the synchronization operation is performed.

Options:

A.

True

B.

False

Buy Now
Questions 92

In the PTN network, how many CES services can a PW carry at most?

Options:

A.

Article 1

B.

Article 2

C.

Article 5

D.

innumerable

Buy Now
Questions 93

In the Huawei PTN7900 LTE solution, which of the following protection methods are used in the L2VPN part?

Options:

A.

MC-PW APS

B.

VPN FRR

C.

IP/VPN FRR

D.

MC-LAG

Buy Now
Questions 94

Which of the following messages is sent in unicast mode

Options:

A.

ARP Request

B.

Peer BFD message

C.

DHCP Discover

D.

DHCP Request

Buy Now
Questions 95

The multi-level connection monitoring mode (TCM) of OTN has three application forms. Which of the following is correct?

Options:

A.

Cascading mode

B.

Overlapping Mode

C.

Nested Mode

D.

Cascade Mode

Buy Now
Questions 96

What are the values of each wavelength in the composite signal that the spectrum analyzer is mainly used for?

Options:

A.

Optical power

B.

Signal to Noise Ratio

C.

Center wavelength

D.

Dispersion value

Buy Now
Questions 97

When creating a PTN tunnel, you can set the priority of the tunnel. There are 0, 1, and 7. The larger the value, the higher the priority.

Options:

A.

True

B.

False

Buy Now
Exam Code: H35-260
Exam Name: HCSA-Field-Transmission & PTN V1.0
Last Update: Nov 21, 2024
Questions: 326
$64  $159.99
$48  $119.99
$40  $99.99
buy now H35-260