Juniper-is在线考试题库
2024年全国大学生网络安全知识竞赛历年题库(精编真题50题)
2024年全国大学生网络安全知识竞赛历年题库(精编真题50题)1、[单选题]sip电话网络现有安全解决方案中,哪个解决方案在RFC3261中已经不再被建议A.HTTP AuthenticationB.TLSC.IPSECD.PGP2、[单选题]SSL提供哪些协议上的数据安全A.HTTP,FTP和TCP/IPB.SKIP,SNMP和IPC.UDP,VPN和SONETPPTP,DMI和RC4D.3、[单选题]下面哪种协议主要是基于UDP协议进行传输的?A.SNMPB.SMTPC.HTTPD.POP4、[单选题]防火墙中地址翻译(NAT)的主要作用是A.提供代理服务B.隐藏内部网络地址C.进行入侵检测D.防止病毒入侵5、[单选题]HTTP,FTP,SMTP建立在OSI模型的那一层?A.2层-数据链路层B.3层-网络层C.4层-传输层D.7层-应用层6、[单选题]由于ICMP消息没有目的端口和源端口,而只有消息类型代码。
通常可以基于()来过滤ICMP数据包。
A.端口B.IP地址C.消息类型D.状态7、[单选题]Windows2000Server中在注册表哪个位置可以设置禁止默认共享()A.HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\param etersB.HKLM\Microsoft\Windows\Services\lanmanserver\parametersC.HKLM\Software\Services\lanmanserver\parametersD.HKLM\Software\Windows\services\lanmanserver\parameters8、[单选题]Oracle数据库的常见TCP端口为:A.1521B.433C.3218D.239、[单选题]SSLVPN设备在7层OSI模型中工作在哪层的设备?A.3B.5C.6D.710、[单选题]只具有()和FIN标志集的数据包是公认的恶意行为迹象。
技能认证PTN专业考试(习题卷16)
技能认证PTN专业考试(习题卷16)说明:答案和解析在试卷最后第1部分:单项选择题,共64题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]SPE从NPE学到核心网路由后,不再向其他UPE和SPE发布,只向UPE发布一条()A)默认路由B)明细路由C)黑洞路由2.[单选题]下列关于LINK_LOS告警说法错误的是A)LINK_LOS中文解释为连接信号中断,表示和对接端口未建立正常连接B)某端口出现RLOS告警一定会同时出现LINK_LOS告警C)某端口出现LINK_LOS一定会同时出现RLOS告警D)2M端口未连接时上报LINK_LOS告警3.[单选题]IPRAN网元指定源地址PING命令为:ping 100.70.255.1 a 100.70.209.129 vrf L3VPN-2ping后为( )地址,a后为( )地址A)源地址/目的地址B)目的地址/源地址C)目的地址/端口IP地址D)目的地址/loopback地址4.[单选题]根据技服公司2015年最新的《工程故障及现网操作指导意见》,工程现网发生重大故障后,上报实现要求错误的是A)驻点负责人须在10-20分钟内上报省技服经理和片区技术代表B)省技术主管须在20分钟内上报至省技服经理和片区技术代表C)省技服经理须在20分钟内上报至办事处主任和技服经理工作群D)产品主管需在40分钟内上报至产品经理和产出线工程部经理5.[单选题]当接入层是PTN设备时(L3PTN除外),E-line业务转发数据报文时,在接入设备的NNI口,数据报文封装了()层L2头部A)1B)2C)3D)46.[单选题]tcpdump设置抓取数据包的个数的参数是:A)-tB)-sC)-iD)-c7.[单选题]IPRAN设备rcu的cpu内存利用率门限需要设置成( ),如果利用率时间过高,分析原因并进行相应处理A)0.4B)0.5C)0.6D)0.88.[单选题]烽火OTNM2000网管界面用什么颜色定义次要告警?A)红B)橙C)黄D)蓝9.[单选题]以下哪个命令可以查看CPU的内存利用率A)ps auxB)conteC)topD)ver10.[单选题]在联通IPRANL2+L3组网模式中,核心设备和RNC对接未部署动态协议,和B网络对接采用ISIS\BGP协议对接,那么,和B网对接端口()配置静态ARP,和RNC对接端口()配置静态ARPA)需要,需要B)需要,不需要C)不需要,需要D)不需要,不需要11.[单选题]OAM的英文全称为Operation Administration and Maintenance,其中检测故障时主要用到()帧和()帧,检查性能劣化主要用到()帧和()帧,用于保护倒换的是()帧,用于管理平面通信的是()帧。
系统集成认证考试试卷及答案
系统集成认证考试试卷1、多选题1.Which of the following are normally used in application security scanning?(Ch oose Two)A:NmapB:NessusC:AppscanD:WVS2、多选题How to check the database log mode? (Choose two)A:SQL> archive log list;B:SQL> select log_mode from v$database;C:SQL> select archivelog from v$database;D:SQL> select * from v$archivelog;3、多选题Every class ip include which two part ?(Choose Two)A:host正确答案B:broadcastC:network正确答案D:multicastE:unicast4、多选题Which two of these addresses are private IP addresses?(Choose Two)A:10.215.34.124B:127.16.71.43C:172.17.10.10正确答案D:225.200.15.105、多选题Which of the following authentication method are based on what you know?(Choose Two)A:Security questions正确答案B:IrisC:Passphrase正确答案D:Software token card6、多选题Which emails we can't open directly?(Choose all that apply)A:Emails from unknown source or origin正确答案B:Emails with just a title "Official Payment Letter" and an attachment正确答案C:Attachment in emails from outside mailbox正确答案D:URL in emails from outside mailbox正确答案7、多选题What does the database do in open stage? (Choose two)A:Associating a database with a previously started instance.B:Locating and opening the control file specified in the parameter file.C:Opening the online data files.D:Opening the online redo log files.正确答案8、多选题Which of the following commands is used to display the status of the NewStartHA cluster?(Choose Two.)A:cluster-stat正确答案B:show-status正确答案C:hastatusD:cmviewclE:cluster statusF:scstat9、多选题Which three file types does the Oracle Database consists? (Choose three)A:Archiveed Log filesB:Data files正确答案C:Control files正确答案D:Redo Log files正确答案E:Parameter fileF:Password file10、多选题in the following options ,which two are not safe transfer methods that use tran sparent password?(choose two)A:ftp正确答案B:sftpC:scpD:sshE:telnet正确答案11、单选题Which of the following is normally used in host security scanning?A:NmapB:Nessus正确答案C:AppscanD:WVS12、单选题How long should we change password at least?A:3 months正确答案B:6 monthsC:9 monthsD:Every year13、单选题Which of the following protocols can not be used as VPN?A:PPTPB:IPSecC:L2TPD:SSH正确答案14、单选题Which command can alter the parameter "log buffer" to 256MB?A:SQL> alter system set log_buffer =268435456 scope=spfile;正确答案B:SQL> set log_buffer =268435456 scope=spfile;C:SQL> alter log_buffer =268435456 scope=spfile;D:SQL> modify log_buffer =268435456 scope=spfile;15、单选题The standby TimesTen is damaged, after the recreation of the TimesTen datastore from the master server.the sequences of the TimesTen is no need to recreate.A:YESB:NO正确答案16、单选题The following command is start the replication agent: $ttrepadmin -repstart ocsA:YESB:NO正确答案17、单选题Which is the default directory of awrrpt.sql that can generate an AWR report?A:$ORACLE_HOME/rdbms/admin/正确答案B:$ORACLE_HOME/rdbms/C:$ORACLE_BASE/admin/rdbms/D:$ORACLE_BASE/rdbms/18、单选题The following command is stop the replication agent: $ttadmin -reppolicy manual ocs $ttrepadmin -repstop ocsA:YESB:NO正确答案19、单选题ALTER DATABASE ARCHIVELOG command must be executed in the nomount status of dat abase.A:YESB:NO正确答案20、单选题which statement is correct about the TimesTen database?A:"dssize" Report the current memory status of the permanent and temporarypartitions as well as the minimum, allocated and usage rate for the data store.B:"call ttbackupstatus"Returns a single row with information about the currentor last backup of the data store.正确答案C:"ttadmin -query ocs" can only get the policy of replication.回答错误D:"monitor" can not get the status of the permanent and temporary partitions.21、单选题Which command can we use to configure persistent settings for RMAN backup, rest ore, duplication, and maintenance jobs.A:SETB:BACKUPC:CONFIGURE正确答案D:MODIFY22、单选题Your database is started by using the server parameter file (SPFILE). You issue d this command to change the value of the LOG_BUFFER initialization parameter: ALTER SYSTEM SET LOG_BUFFER=24M SCOPE=BOTH; What would be the outcome of this c ommand?A:The command would return an error because LOG_BUFFER is a static parameter.正确答案B:The parameter value would be changed and it would come into effectimmediately.C:You need to restart the database so that parameter changes can come intoeffect.D:The command would succeed only if initialization parameterLOG_ARCHIVE_MAX_PROCSS is set to value 2.23、单选题Which is the default path of alert log in Oracle 11g if the ORACLE_SID is cc?A:$ORACLE_BASE/diag/rdbms/cc/cc/trace正确答案B:$ORACLE_BASE/admin/cc/bdump回答错误C:$ORACLE_HOME/diag/rdbms/cc/cc/traceD:$ORACLE_HOME/admin/cc/bdump24、单选题Which command reveals the last method used to powercycle a cisco switch?A:show reloadB:show bootC:show running-configD:show version正确答案25、单选题A layer 3 devices will send hello messages when the HSRP states are active, sta ndby and speak.A:YES正确答案B:NO26、单选题When configuring a routed port on a Cisco multilayer switch, which configuratio n task is needed to enable that port to function as a routed port?A:Enable the switch to participate in routing updates from external deviceswith the router command in global configuration mode.B:Enter the no switchport command to disable Layer 2 functionality at the interface level.正确答案C:Each port participating in routing of Layer 3 packets must have an IP routing protocol assigned on a perinterface level.D:Routing is enabled by default on a multilayer switch, so the port can becomea Layer 3 routing interface by assigning the appropriate IP address and subnet information.27、单选题The decimal number 10 converts to the binary number?A:10B:1010正确答案C:110D:100028、单选题which one is the purpose of a switch?A:to connect separate networks and filter the traffic over those networks so that the data is transmitted through the most efficient routeB:to choose the path over which data is sent to its destinationC:to serve as the endpoint in the network, sending and receiving dataD:to provide network attachment to the end systems and intelligent switching of the data within the local network正确答案29、单选题how to let command "sleep 1500" running in the backgroudA:nohup sleep 1500B:nohup sleep 1500 &&C:sleep 1500 nohup &D:nohup sleep 1500 &正确答案30、单选题Using which command you find resource limits to the session?A:rlimitB:ulimit正确答案C:setrlimitD:getrlimit31、单选题when you use vi to edit a file ,in the normal mode ,how to delete a whole lineA:xB:dd正确答案C:XD:DD32、单选题Which of the following will kill the process 1010 by an administrator(logged in as a standard user)? The process 1010 was started by the root user.A:kill 1010B:su "kill 1010"C:su -c "kill 1010"正确答案D:killall -9 101033、单选题Which directory contains configuration files that stores system and application setting?A:/etc正确答案B:/libC:/usrD:/var34、单选题how to query the current time zoneA:dateB:date -R正确答案C:hwclockD:hwclock -R35、单选题In the directory /test ,you want to check if some files have the keyword "hello " ,and find these lines ,what is the best wayA:grep hello *正确答案B:grep * helloC:find ./ -name "hello"D:find / -name "hello"36、单选题for /etc/hosts.allow and /etc/hosts.deny acl file,which one has higher priority to be used to authority when a request comes ?A:/etc/hosts.allow正确答案B:/etc/hosts.denyC:same priorityD:it depends on37、单选题to check network issus,you need to ping a server 8.8.8.8 ,the frequency is 2s,p ackage size is 128bytes,totally ping 100 times,pls give right commandA:ping -c 128 -s 100 -i 2 8.8.8.8B:ping -s 128 -c 100 8.8.8.8C:ping -s 128 -c 100 -i 2 8.8.8.8正确答案D:ping -s 128 -i 100 -c 2 8.8.8.838、单选题Which shell script is the first startup script run when a login shell is starte d in Linux?A:~/.bashrcB:~/.profileC:/etc/profile正确答案D:/etc/bashrc39、单选题Which command is used to check file type?A:typeB:file正确答案C:finfoD:info40、单选题how to generate rsa public key for the current user?A:ssh-keygen -fB:ssh-keygen -t rsa正确答案C:md5sumD:md5sum -fWhat is the operating voltage Lenovo x3650M5 900W power supplyA:48V ACB:110V ACC:200-240 V AC正确答案D:380V AC42、单选题What instruction set does the HP BL890 use?A:RISC正确答案B:DISCC:CISCD:FISC43、单选题NewStartHA allows initialization and management of cluster and services via cli (command line) or web. Is that true?A:YES正确答案B:NO44、单选题Which one of the following commands is used to enter the NewStartHA command lin e interface?A:cli正确答案B:asmcmdC:cmdD:smitE:smhWhich one of the following commands is is used to start service manually in the NewStartHA cluster?A:service-start正确答案B:cmrunpkgC:clusvcadmD:hagrpE:clmgr46、单选题which is the recommendation temperature for the machine room?A:0~7°CB:10~17°CC:18~25°C正确答案D:28~35°C47、单选题The main lines require redundant links to ensure high availability of transmiss ionA:YES正确答案B:NO48、单选题All network cable, fiber cable, information module, distribution frame, rack sh ould neat and labeled, to ensure maintenance is convenient and flexible operati on.A:YES正确答案B:NO49、单选题Which features don't need to be satisfied for the machine room decoration?A:Dust preventionB:Anti-static electricityC:Invisible light正确答案D:Fire-retardant50、单选题If you deploy the network cable on a production system(cvBS system),which is the best category of the network cable?A:Category 3B:Category 4C:Category 5D:Category 5E正确答案系统集成认证考试第一期(汤凤青)1、多选题which two descriptions are correct about the category 5E network cable?(Choose two)A:Terminated with RJ-45 connectors正确答案B:For runs of up to 1000 metersC:For runs of up to 90 meters正确答案D:100Mbps data capacity2、多选题which are Foreign well-known network manufacturers?(Choose Three)A:Cisco正确答案B:HuaweiC:Juniper正确答案D:ZTEE:CheckPoint正确答案3、多选题Which of the following can be considered a good password?(Choose Two)A:SecpasswdB:Sec_ls@co1正确答案C:ZTEsoftD:Rea1#g00d正确答案4、多选题How to check the database log mode? (Choose two)A:SQL> archive log list;正确答案B:SQL> select log_mode from v$database;正确答案C:SQL> select archivelog from v$database;D:SQL> select * from v$archivelog;5、多选题Which of the following authentication method are based on what you know?(Choose Two)A:Security questions正确答案B:IrisC:Passphrase正确答案D:Software token card6、多选题Which two of these addresses are private IP addresses?(Choose Two)A:10.215.34.124正确答案B:127.16.71.43C:172.17.10.10D:225.200.15.107、多选题if you can ping a remote server(8.8.8.8) in you local server ,besides ,you want to know if the 21 port is open or not on the remote server ,how to check?(chos e two)A:telnet 8.8.8.8 21正确答案B:netstat -an|grep 21C:nc -v 8.8.8.8 21正确答案D:ssh 8.8.8.8 218、多选题Which two views can get the information about redo log file? (Choose two)A:V$LOG正确答案B:V$LOGFILE正确答案C:V$DATAFILED:V$ARCHIVELOG9、多选题What does the database do in open stage? (Choose two)A:Associating a database with a previously started instance.B:Locating and opening the control file specified in the parameter file.C:Opening the online data files.正确答案D:Opening the online redo log files.10、多选题how many class For IP Address classed? (Choose all that apply)A:Class A正确答案B:Class B正确答案C:Class C正确答案D:Class D正确答案E:Class E正确答案F:Class F11、单选题We customer service staffs are safe and can't cause information security incide nts.A:YESB:NO正确答案12、单选题Which of the following is not information security basic features?A:ConfidentialityB:IntegrityC:AvailabilityD:Non repudiation正确答案13、单选题Which of the following authentication method is based on who you are?A:CaptchaB:Security questionsC:Digital certificateD:Iris正确答案14、单选题Which is the default path of alert log in Oracle 10g if the ORACLE_SID is cc?A:$ORACLE_BASE/diag/rdbms/cc/cc/traceB:$ORACLE_BASE/admin/cc/bdump正确答案C:$ORACLE_HOME/diag/rdbms/cc/cc/traceD:$ORACLE_HOME/admin/cc/bdump15、单选题If you find a long running transaction on the TimesTen database for MANY hours, The details are as follows, how to solve it? Command> call ttlogholds; < 0, 118 10816, Long-Running Transaction , 2.176 > < 0, 11821056, Checkpoint , ocs.ds1 > < 0, 11823104, Checkpoint , ocs.ds0 > 3 rows found.A:ttXactAdmin -xact 2.176 -connstr DSN=ocsB:ttXactAdmin -xactIdRollback 2.176 ocs正确答案C:Wait the transaction rollback or commit automatically.D:None of the others is correct16、单选题The database is create in default ARCHIVELOG mode.A:YESB:NO正确答案17、单选题Which is the correct description of the significance of the ORACLE_HOME environ mental variable?A:It specifies the directory containing the Oracle software.正确答案B:It specifies the directory containing the Oracle-Managed Files.C:It specifies the directory for database files, if not specified explicitly.D:It specifies the base directory of Optimal Flexible Architecture (OFA) .18、单选题ALTER DATABASE ARCHIVELOG command must be executed in the open status of databa se.A:YESB:NO正确答案19、单选题You need to set the DISPLAY environment variable before using dbca in Linux ser ver. Which is the correct command to set DISPLAY in Linux Server?A:export DISPLAY=Your Laptop IPB:export DISPLAY=Your Laptop IP:0.0正确答案C:export DISPLAY=Oracle Server IPD:export DISPLAY=Oracle Server IP:0.020、单选题What is the AWR reports?A:An Instance creative toolB:A useful diagnostic tool正确答案C:A listener toolD:A Oracle install tool21、单选题You want to enable archiving on your database. Presently, the database is runni ng in NOARCHIVELOG mode. Given below are the steps to accomplish the task in ra ndom order: 1. Shut down the instance. 2. Execute the ALTER DATABASE ARCHIVELOG command. 3. Start up the instance and mount the database. 4. Set the LOG_ARCHI VE_DEST_1 initialization parameter. 5. Open the database. Which is the correct sequence of steps for accomplishing the task?A:1,3,4,5,2B:4,1,3,2,5正确答案C:1,3,4,2,5D:4,1,3,5,222、单选题which version of TimesTen can get the details of the sql information when the l ong running transactions happened?A:TimesTen6B:TimesTen7C:TimesTen8D:TimesTen11正确答案23、单选题SHOW PARAMETER command can show the parameters of database.A:YES正确答案B:NO24、单选题When you are logged into a cisco switch, which prompt indicates that you are in privileged mode?A:%B:@C:>D:$E:#正确答案25、单选题how to display Cisco switch current active configuration ?A:show running-configuration正确答案B:display current-configurationC:show configure | display setD:show running-configE:sys config immediate26、单选题What is the purpose using the traceroute command?A:to map all the devices on a networkB:to display the current TCP/IP configuration valuesC:to see how a devices MAC address is mapped to its IP addressD:to see the path a packet will take when traveling to a specified destination 正确答案E:to display the MTU values for each router in a specified network path from source to a destination27、单选题how to check all the interface status on cisco switch?A:show interface status正确答案B:display interfaceC:show running-configurationD:show ip interface28、单选题how to monitor H3C switch past CPU utilizations ?A:show processes cpuB:display cpuC:display cpu-usage history正确答案D:show processes cpu history29、单选题For system events of LINUX platform ,the most commonly refered log file is ?A:/var/log/messages正确答案B:/var/log/lastlogC:/var/log/tallylogD:core files30、单选题for /etc/hosts.allow and /etc/hosts.deny acl file,which one has higher priority to be used to authority when a request comes ?A:/etc/hosts.allow正确答案B:/etc/hosts.deny回答错误C:same priorityD:it depends on31、单选题in the linux platform (redhat/centOS 5or6 ),when you start a process ,but fail ed ,the log reports that IP address(or port) is already in use ,which one is th e most reasonable?A:IP address is invalidB:the route is not rightC:the firewalled is startedD:the port is occupied正确答案32、单选题how to query the commands that already been executed?A:history正确答案B:scriptC:scriptsD:histories33、单选题how to check password expire time of user "ocs" on Redhat6&Centos6 platform?A:passwd -l ocsB:change -l ocsC:chage -l ocs正确答案D:pam_tally2 -u ocs34、单选题Which directory contains configuration files that stores system and application setting?A:/etc正确答案B:/libC:/usrD:/var35、单选题how the check the filesystem space usage on Red Hat operating system?A:df -h正确答案B:df -iC:df -uD:du -h36、单选题you create /ztesoft/uip folder as root ,how to change the owner to uip user ,pr iority group to ztesoft group?A:chmod uip:ztesoft /ztesoft/uipB:chmod 777 /ztesoft/uipC:chown uip:ztesoft /ztesoft/uip正确答案D:chown 777 /ztesoft/uip37、单选题Please show how to check your gcc and glibc versionA:gcc -version ldd -versionB:gcc --version ldd --version正确答案C:gcc --version glibc --versionD:g++ --version glibc --version38、单选题Linux system (redhat/centOS 5or 6 ) has 7 run level ,which level is start syste m normally?A:level 0B:level 1C:level 2D:level 3正确答案39、单选题what is the relationship between linux and unix?A:unix is from linuxB:linux is from unix正确答案C:they are independentD:None of the others is correct40、单选题Which command is used to check file type?A:typeB:file正确答案C:finfoD:info41、单选题What classification of Lenovo x3650 M5?A:mainframeB:Midrange computerC:Blade serverD:PC Server正确答案42、单选题what's kind of the power cable can be use for Lenovo x3650M5A:C9,C10B:C19,C20C:C13,C14正确答案D:C15,C1643、单选题Which one of the following commands is is used to start service manually in the NewStartHA cluster?A:service-start正确答案B:cmrunpkgC:clusvcadmD:hagrpE:clmgr44、单选题If the service is at stopped status in the cluster when executing clear-fault, the service will remain stopped after the execution. Is that true?A:YES正确答案B:NO45、单选题If the version of the NewStartHA software in the program CD is not the latest c ommercial version, it is recommended to download the latest version from our we bsite (). Is that true?A:YES正确答案B:NO46、单选题The power module of one device may be DC module or AC module.A:YES正确答案B:NO47、单选题The machine room should have waterproof damage measure, make sure the machine r oom is safeA:YES正确答案B:NO48、单选题which statement is correct about the high-voltage electrical current?A:The frequent interrupted power supply system can be used for the machine room.B:The computer system must be deployed separately from the power and lighting systems正确答案C:UPS can use single power supply回答错误D:Power cable should be equal to summary power consumption of the all equipments.49、单选题The line sequence for the type of TIA/EIA 568B is as follows: OrangeWhite->Oran ge->GreenWhite>Blue->BluWhite->Green->BronwWhite->BronwA:YES正确答案B:NO50、单选题how many lines of the power source supply for the standard rack?A:1B:2正确答案C:5D:6系统集成认证考试第一期(薛晓同)。
专业题库-Juniper设备多选(86题)
在VPN网络中,MP-BGP主要完成的任务有: A.VPN路由的交换 B.VPN数据包的转发 C.Inner-label的交换 D.Outer-label的交换 哪些个项目是配置速率限制策略的必选? A. bandwidth-limit B. burst-size-limit C. packet-size-limit D. time-period JUNOS支持哪些端口的聚合? A. ATM B. Tunnel C. Ethernet D. SONET JUNIPER的缺省PIM模式是? A. Dense B. Version 1 C. Version 2 D. Sparse E. Sparse-Dense 哪两种源路由信息是存放在inet.2路由表中的,为RPF检查确认使用? A. MBGP B. Multi-topology IS-IS C. OSPF D. Static routes IGP 包括如下哪些协议 A. RIP B. BGP C. IS-IS D. OSPF 关于RIP V1和RIP V2,下列说法哪些正确? A. RIP V1报文支持子网掩码 B. RIP V2报文支持子网掩码 C. RIP V2缺省使用路由聚合功能 D. RIP V1只支持报文的简单口令认证,而RIP V2支持MD5认证 下面哪些协议是可路由协议(routed protocol)? A. IP B. IPX C. RIP D. NETBEUI Juniper路由器中,哪个属性是物理接口的配置? (Choose three.) A. Keepalives B. IP Address C. Description D. FCS 哪些是自治域(AS)定义的属性? a) 仅受一个组织管理的一组路由器和地址 b) 受全局一致的路由策略管理一组路由器和地址 c) 使用相同IGP协议的一组路由器和地址 d) 受一个或多个组织管理的一组路由器和地址
技能认证PTN专业考试(习题卷11)
技能认证PTN专业考试(习题卷11)说明:答案和解析在试卷最后第1部分:单项选择题,共64题,每题只有一个正确答案,多选或少选均不得分。
1.[单选题]V2.3SP4 BD2版本支持 isis lsp pdu 的最大长度为()A)1490B)1492C)14972.[单选题]下列设备()只能实现半双工通信A)三层网关B)路由器C)二层交换机D)集成器3.[单选题]PTN640设备在配置1:1保护时,LSP标签值正向与反向( )A)可以相同;B)一定相同;C)一定不同;D)没有要求。
4.[单选题]升级RCUO1盘时,升级文件放置的目录为是( )A)/home/updatedir/B)/home/scu/C)/home/bmu852/D)/home/5.[单选题]链路聚合的优点是( )。
A)提高链路带宽B)流量负荷分担C)提高可靠性,同组成员彼此动态备份D)以上全部6.[单选题]如果网元的IP地址为W.X.Y.Z,不同的网元之间通过改变IP地址W.X.Y.Z中的X位来区别不同的子网,而其IP地址中的Y位一般取最大有效值254A)Y、254B)Y、255C)X、254D)X、2557.[单选题]ip报文投中固定长度部分有()字节 (1.5分)A)A . 10.0B)B . 20.0C)C . 30.0D)D . 40.08.[单选题]OSPF路由协议区域间的环路避免是通过哪种方式实现的A)分层结构的拓扑实现B)基于SPF计算出的无环路径C)基于area IDD)基于AS ID9.[单选题]如下所述的哪一项是OSI参考模型数据链路层的功能A)在信道上传输原始的比特流,实现传输数据所需要的机械、电气、功能性及过程等手段B)检查网络拓扑,以决定传输报文的最佳路由C)检测并纠正可能出现的错误,使之对网络层显现一条无错线路,并且进行流量调控D)为应用软件提供套接字接口10.[单选题]OSPF中,ABR必须和( )区域相连A)STUBB)完全STUBC)area 0D)丌需要一定和某个区域相连11.[单选题]PW冗余保护属于()保护,LSP保护属于()保护A)tunnel,VCB)VC,tunnelC)tunnel,tunnelD)VC,VC12.[单选题]BACKUP_FAULT告警出现在什么地方?A)业务源节点B)业务宿节点C)故障点相邻网元D)业务原宿节点都有13.[单选题]拓扑结构优化措施中,下面说法错误的是A)长链的优化,在光缆资源不足时,可形成局部二层环,在局部形成拓扑保护B)当前拓扑评估包括光缆同路由评估C)巨环优化,可依据光缆路由,进行拆分整合,形成较小环网D)双归宿结构有助于减少网络风险点14.[单选题]ZXCTN 6200/6300设备的程序文件一般存放在A)/flash/imgB)/flash/C)/flash/dataD)/flash/cfg15.[单选题]VPN FRR实现的是()的保护A)路径B)端口C)目的IPD)节点16.[单选题]交换机大都采用了()技术,来保证组播帧在交换机各端口之间的正确发送A)IGMP SnoopingB)IGMPC)ARPD)RARP17.[单选题]LTE业务L3层不通处理方法不当的是?A)检查L3VPN的配置以及不用户侧UNI对接的配B)检查TP接口静态ARP配置是否正确C)检查L3VPN的路由是否正确的生成下一跳的路由D)配合用户侧对接异厂家设备检查对方是否正确配置相关的IP地址以及路由信息18.[单选题]要在PC机上看看有哪些TCP连接,用那条命令A)NetstatB)pingC)ARPD)ipconfig19.[单选题]PDP单元的作用不包括哪一项() (1.5分)A)A . 接入外部电源B)B . 电源分配C)C . 告警处理D)D . 接入时钟20.[单选题]ARP 的主要作用是什么( )。
3.3.15-4-爱立信CMNET复习题
陕西移动-爱立信CMNET习题一、单项选择(100题)1.下面哪一项正确描述了路由协议A. 允许数据包在主机间传送的一种协议B. 定义数据包中域的格式和用法的一种方式C. 通过执行一个算法来完成路由选择的一种协议D. 指定MAC地址和IP地址捆绑的方式和时间的一种协议答案:C2、下面哪些是可能的队列机制?( )A:FIFOB:Priority Queuing (PQ)C:Custom Queuing (CQ)D:WFQE:Class-based WFQF:以上全部答案:F3、802.1P一共定义了多少个优先级。
( )A:4B:8C:16D:32答案:B4.下列哪一个PIM消息类型是路由器发送给上游邻居,请求邻居停止发送组播数据?A. JoinB. PruneC. GraftD. Register答案:B5.下列哪一个rendezvous point机制是PIMv2版本中的一部分?A. Local RPB. Static RPC. Auto-RPD. Bootstrap router答案:D6.IGMPV2协议和IGMPV1协议相比增加了哪种报文:()A、组报告消息B、组成员查询消息C、特定组离开消息D、组建立消息答案:C7. 在组播网络中RPF 代表什么?A. Reverse protocol forwardingB. Reverse protocol floodingC. Reverse path forwardingD. Reverse path flooding答案:C8. 当组播主机从rendezvous point接收包, 哪种类型的树将会加入?A. Shared treeB. Source-based treeC. Wildcard treeD. Flooding tree答案:A9.下列那一个PIM消息类型是当路由器收到一个接受组播IGMP请求信息,然后路由器发送给RP的?A. JoinB. PruneC. GraftD. Register答案:A10、哪些机制可用用来标记数据包?( )A:Policy-based Routing (PBR)B:Committed Access Rate (CAR)C:QoS Policy Propagatiothrough BGP (QPPB)D:Class-based PolicingE:Class-based MarkingF:以上全部答案:F11、以下字段与Qos无关的是:()。
专业题库-Juniper设备实际操作(116题)
PE-AS (VRF背对背)方ISP的MPLS VPN网络。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
Testpassport最新Juniper Networks JN0-202 题库免费下载
Version : DEMO
1/5
The safer , sier way to help you pass any IT exams.
1 .Which command allows real-time monitoring of interface statistics on interface so-0/0/0? A. monitor interface so-0/0/0 B. monitor traffic interface so-0/0/0 C. monitor statististics so-0/0/0 D. monitor so-0/0/0 Answer: A 2 .Which command can be used to display information about packets that have been logged with the log firewall filter action? A. show log B. show log messages C. show firewall D. show firewall log Answer: D 3 .To create a stable IBGP peering arrangement, it is recommended that internal peering be created between the loopback interfaces of the IBGP peering routers. Why is the local-address command required for successful connectivity in this scenario? A. to send the BGP Open message B. to tell the local router which interface the update is going to be received on C. to tell the local router which interface to source the update from D. to authenticate using MD5 between these neighbors Answer: C 4. How can you identify all routes that are more specific than 10.0/16, excluding the exact match? A. route-filter 10.0/16 longer B. route-filter 10.0.0/17 longer C. route-filter 10.0/16 orlonger D. route-filter 10.0.0/17 upto /32 Answer: A 5. Which router feature will improve Routing Engine fail-over times? A. GRES B. RED C. MPLS D. VRRP Answer: A 6. Given the following policy: policy-statement limit-cust { from { route-filter 192.168.0.0/16 orlonger accept; route-filter 192.168.8.0/21 longer; route-filter 192.168.0.0/24 orlonger { metric 5;
考试题目
联通IPRAN分组网络运行维护技能考试考试(时间:90分;满分100分)一、单选题目(20分,每题1分)1、IS-IS网络中,设备的角色缺省是(),联通场景一般需要修改成什么角色();A、Level-1,Level-1B、Level-2,Level-2C、Level-1-2,Level-1D、Level-1-2 ,Level-22、以下()协议被用作为动态L3 VPN分配内层标签。
A、LDPB、RSVP-teC、MP-BGPD、ospf3、以下关于RT属性描述不正确的是()。
A、T的这两个路由策略属性使得VPN可以灵活部署。
常见的VPN连接方式有Hub-spoke连接和全网状连接。
B、在全网状连接中,各节点RT中的import target和export target一致,这样网络中的各节点都能学习到全网路由信息。
C、在Hub-spoke连接中,Hub节点Import Target和Spoke节点Import Target配置一致,Hub节点Export Target和Spoke节点Export Target配置一致。
D、对于Hub-spoke连接中,只有Hub节点可以学习到Spoke节点的路由信息,Spoke节点间无法学习路由信息。
4、对于L3 VPN,当需要在PE节点宣告客户的路由或者汇聚客户的路由时,是在PE节点的()下完成的。
A、BGP 路由模式B、BGP的IPV4地址族模式C、VPNV4 地址族模式5、ZXCTN9000设备现场采用PW伪线保护方案时,请增加对应三层口的()配置,否则会引起切换或者回切时间长的一些问题。
A、静态路由B、静态MACC、静态ARPD、静态IP6、使能DCN便携开通功能时,设备将专门开启VLAN______作为DCN的监控VLANA、4091B、4092C、4093D、40947、在联通分组网中,核心汇聚层中SCN使用的是那种协议A、ISISB、BGPC、ospfD、rsvp8、TDM业务单归场景中伪线保护方式为()A、1:1单发双收B、1:1单发单收C、1+1单发单收D、1+1单发双收;9、IPRAN网络中需要使用的保护倒换技术主要有A、TE-HSBB、VPN FRRC、PW FRRD、以上全对10、PS业务采用L2+L3的开通方式,L2部分采用的伪线双归是那种模式()A、1:1单发双收B、1:1单发单收C、1+1单发单收D、1+1单发双收;11、查看6000设备光功率的命令:A、sho perf-value interface ***B、sho optical-info interface **C、sho interface ***D、sho ip interface ***12、IPRAN设备可以查看单板温度的命令是A、Show interface briefB、Show logging current-alarmC、show versionD、Show run13、我司IPRAN设备使用下面哪个命令,可以查看所有设备配置的所有ip地址A、show ip configB、show ip interface briefC、show interface ip briefD、show ip config all14、在业务视图中,每条业务都有一个属性项叫“一致性状态”,按照影响恶劣程度从高到低分为:异常、残损、被延伸、一致。
通信网络习题库(含参考答案)
通信网络习题库(含参考答案)一、单选题(共53题,每题1分,共53分)1.会话的MT过程中,S-CSCF会把被叫的()转化成()A、SIP号码,IP地址B、SIP号码,TEL号码C、IP地址,SIP号码D、TEL号码,SIP号码正确答案:A2.在BGP选路规则中,对Origin树形的优先级判断原则是()A、EGP>Incomplete>IGPB、IGP> Incomplete >EGPC、Incomplete >EGP>IGP AnswerD、IGP>EGP> Incomplete正确答案:D3.IP地址通常分为A、B、C三类在一个C类地址中,最多可以分出()个子网A、128B、126C、62D、64正确答案:D4.EMS通过厂站远动终端设备或测控装置采集的数据反映了电网的稳态潮流情况,其实时性为()A、分钟级B、小时级C、秒级D、毫秒级正确答案:C5.系统频率降低时,可以通过()的办法使频率上升A、增加发电机有功出力,减少用电负荷B、投入大电流联切装置C、减少发电机有功出力D、增加发电机的励磁,降低功率因数正确答案:A6.CDMA空中接口系统负荷对容量和覆盖的同时都有影响,当负荷越大()A、容量越大,覆盖越大B、容量越小,覆盖越大C、容量越大,覆盖越小D、容量越小,覆盖越小正确答案:C7.OTN系统中,OTU1的帧结构大小为4*4080字节,那么OTU2的帧结构大小为()A、8*4080B、4*4080C、16*4080D、32*4080正确答案:B8.IMS的概念是是从()中引入的A、CS网络B、NGNC、CDMA2000D、PS网络正确答案:D9.掺铒光纤的激光特性()A、主要由入射光的工作波长决定B、主要由掺铒元素决定C、主要由泵浦光源决定D、主要由起主介质作用的石英光纤决定正确答案:B10.OSPF的认证方式不包括下列选项中的()A、不认证B、简单口令认证C、MD5认证D、明文认证正确答案:D11.按照防火墙工作原理可以将防火墙可划分为()A、独立式防火墙和集成式防火墙B、软件防火墙和硬件防火墙C、边界防火墙和个人防火墙D、包过滤防火墙、代理型防火墙和状态检测型防火墙正确答案:D12.TMS系统中一级网检修计划发起时间为()A、人工在每月一日触发B、人工在每月第一个工作日触发C、系统自动在每月一日零时触发D、系统自动在每月第一个工作日零时触发正确答案:C13.TMS系统中机房编号以()开头A、R001B、A01C、H01D、H001正确答案:C14.当不同路由协议RIP、OSPF、BGP等各自得到了一条到达目标网络,()作为最优路由的选择原则A、管理距离越大,路由越优先B、管理距离越小,路由越优先C、度量值越大,路由越优先D、度量值越小,路由越优先正确答案:B15.L3MPLS-VPN网络中,P设备必须要维护的信息有()A、私网路由B、vpn-instanceC、公网路由D、私网LSP正确答案:C16.ADSL的不对称性是指()A、上下行线路长度不同B、上下行线路粗细不同C、上下行速率不同D、上下行信号电压不同正确答案:C17.MPLS-VPN网络中,作为P设备,那么一定需要支持的功能是()A、M-BGPB、LDPC、OSPFD、BGPv4正确答案:B18.高压输电线路的故障绝大部分是()A、单相接地短路B、两相接地短路C、两相相间短路D、三相短路正确答案:A19.公司有用户反映在使用网络传输文件时,速度非常低,管理员在网络中使用Wireshark软件抓包发现了一些重复的帧,下面关于可能的原因或解决方案描述正确的是()A、交换机在MAC地址表中查不到数据帧的目的MAC地址时,会泛洪该数据帧B、公司网络的交换设备必须进行升级改造C、网络在二层存在环路D、网络中没有配置VLAN正确答案:C20.通信专用蓄电池单体电压等级应是()A、48VB、24VC、12VD、2V正确答案:D21.TMS系统告警操作台中,点击标题栏中的红色手型按钮可以进行的操作是()A、归并B、批量定性C、批量确认D、查看地市告警正确答案:C22.两个UE之间为了建立、更改、释放媒体所需要建立的信令关系称为()A、对话B、会话C、事务D、信令连接正确答案:A23.以下协议中支持可变长子网掩码(VLSM)和路由汇聚功能(RouteSummarization)的是()A、IGRPB、RIPv1C、OSPFD、VTP正确答案:C24.在光路资源信息管理中,下列()资源与光路数据一一对应A、业务B、光缆C、传输段D、SDH网元正确答案:C25.本端产生支路输入信号丢失,对端相应支路收到()告警A、AISB、LOSC、LOFD、LOP正确答案:A26.光纤纤芯折射率为1.5,用OTDR定时装置测得信号从A点到B点往返的时间为15μs,那么()B两点间的光纤长度为()mA、1500B、3000C、6000D、4500正确答案:A27.两个主机之间要进行UDP协议通信,首先要进行()次握手B、1C、2D、3正确答案:A28.哪一种简单协议交换数据使不需要进行确认和保证数据到达()A、TCPB、ASPC、TCP/IPD、UDP正确答案:D29.电网运行的客观规律包括()A、异步性、变化性、电网事故发生突然性B、变化性、快速性、电网事故发生突然性C、同时性、平衡性、电网事故发生突然性D、瞬时性、快速性、电网事故发生突然性正确答案:C30.STP的主要目的是()A、防止“广播风暴”B、防止网络中出现信息回路造成网络瘫痪C、使网桥具备网络层功能D、防止信息丢失正确答案:B31.某AR2200路由器通过OSPF和RIPv2同时学习到了到达同一网络的路由条目,通过OSPF学习到的路由的开销值是4882,通过RIPv2学习到的路由的跳数是4,则该路由器的路由表中将有()A、RIPv2路由B、OSPF和RIPv2C、OSPF 路由D、两者都不存在正确答案:C32.TMS系统,月累计告警处理率,持续时间小于()分钟的未处理根告警不纳入统计A、60C、10D、15正确答案:D33.在ISO定义的七层参考模型中,对数据链路层的描述正确的是()A、提供应用软件的接口提供端到端数据传输的链路建立机制B、检查网络拓扑结构,进行路由选择和报文转发C、实现数据传输所需要的机械、接口、电气等属性D、实施流量监控,错误检测,链路管理,物理寻址正确答案:D34.C/S结构的LAN中,数据传输的瓶颈在()A、交换机与服务器连接的端口B、交换机与客户机连接的端口C、客户机与交换机连接的网线D、客户机与交换机连接的网卡正确答案:A35.RIP协议的路由项在()时间内没有更新会变为不可达A、180sB、90sC、240sD、120s正确答案:A36.在目前最常用的G.652光纤中,波长为()的光具有最小损耗A、1550nmB、850nmC、1720nmD、1310nm正确答案:A37.电感在直流电路中相当于()A、不存在B、开路C、断路D、短路正确答案:D38.TD-LTE为()系统A、TDMA/ TDDB、CDMA/TDDC、OFDM/FDDD、OFDM/TDD正确答案:D39.TMS系统资源管理模块中通信机柜的类型通常不包括()A、综合配线架B、ODF配线架C、RDF配线架D、VDF配线架正确答案:C40.EIRP是下列()端口的发射功率A、机顶B、RRU口C、馈线D、天线正确答案:D41.光缆和ODF进行连接时,连接芯数取决于()A、现场已被占用,完成光连接的芯数B、现场ODF带有光纤连接器的多少C、核实台账资料,实际光缆与ODF相连的芯数D、以上都不对正确答案:C42.STM-N帧结构中,B2字节的个数是()A、1B、NC、3ND、以上都不对正确答案:C43.在广播类型网络中,DIS默认发送hello时间间隔为多少()A、5sB、10sC、3.3sD、40s正确答案:C44.下列不属于通信统计指标的是()A、月度检修归档率B、通信检修申请票正确率C、月度计划检修完成率D、月度临时检修率正确答案:A45.IEE802.3ae10Gb/s以太网标准支持的工作模式是()A、单工B、全双工C、半双工D、全双工和半双工正确答案:B46.TD-LTE制式属于第()代移动通信技术A、1B、2C、3D、4正确答案:D47.在网络协议中,规定通信双方数据与控制信息的结构和格式的这部分是()A、规则部分B、规约部分C、语法部分D、语义部分正确答案:C48.TMS中告警操作台中对告警的统计格式为下面那种()A、已确认/未确认B、未确认/已确认C、已确认/总数D、未确认/总数正确答案:C49.不属于光纤衰减损耗的是()A、弯曲损耗B、散射损耗C、吸收损耗D、固有损耗正确答案:A50.单向通道保护环的触发条件是()告警A、MS-AISB、MS-RDIC、LOSD、TU-AIS正确答案:D51.目前,波分系统中信道波长是等间隔的,即()A、k*0.4nmB、k*0.2nmC、k*1nmD、k*0.8nm正确答案:D52.造成光纤中传输的光波信号出现畸变的重要原因是()A、光纤色散B、材料色散C、波导色散D、零色散波长正确答案:A53.再生段开销RSOH由()接入A、自己生成B、终端设备TMC、再生器REGD、再生器REG或终端设备TM正确答案:D二、多选题(共25题,每题1分,共25分)1.关于BGP/MPLSVPN第二种跨域方式(optionb,ASBRtoASBR)的说法正确是()A、ASBR之间建立MP-EBGP邻居关系B、ASBR之间建立MP-IBGP邻居关系C、私网数据在AS之间转发时不带标签D、私网数据在AS之间转发时带有标签正确答案:AD2.光同步传送网的主要传输损伤有()A、延时B、误码C、漂移D、抖动正确答案:ABCD3.通信用阀控式铅酸蓄电池主要由()等组成A、电解液(硫酸)B、二氧化铅(正极)C、安全阀及外壳D、铅(负极)正确答案:ABCD4.TD-SCDMA具有”3S”特点()A、智能天线(smart antenna)B、同步CDMA(synchronous cdma)C、软件无线电(software radio)D、软件无线电(software wireless)正确答案:ABC5.以太网交换机端口的通信方式可以被设置为()A、自动协商B、全双工C、Trunk模式D、半双工正确答案:ABD6.下面的器件既可以作为合波器又可以作为分波器的是()A、AWGB、TFF介质膜C、耦合器D、衍射光栅正确答案:ABD7.下列属于OTN线性保护技术的是()A、光线路保护B、板内侧1+1保护C、SW SNCP保护D、ODUk SNCP保护正确答案:ABCD8.SIP消息分两种()A、请求消息B、反馈消息C、查询消息D、响应消息正确答案:AD9.同步状态字节S1可以携带()A、网元IDB、时钟IDC、时钟质量D、线路信号频偏正确答案:BC10.1号信令是一种随路信令,它包括()A、用户信令B、线路信令C、管理信令D、记发器信令正确答案:BD11.通信值班工作台运行记录中不能启动哪些工单()A、工作通知单B、业务方式单C、缺陷单D、检修单正确答案:AB12.关于STP下列描述正确的是()A、一个非根桥上可能存在多个根端口和一个指定端口B、根桥上不存在根端口C、根桥上不存在指定端口D、一个非根桥上可能存在一个根端口和多个指定端口正确答案:BD13.TMS系统中,有关月度检修计划,以下说法错误的是( )A、计划检修只需要更改检修状态,不需要关联月度计划检修B、目前月检修计划分为一二级网、三四级网两种C、当月的月度检修计划必须当月填报D、月度检修计划由各单位自行发起填报正确答案:ACD14.四纤双向复用段保护环与二纤双向复用段共享保护环相比,其特点是:()A、业务量加倍B、保护倒换时间快。
CMNET专业题库-Juniper设备
PE-AS (VRF背对背)方ISP的MPLS VPN网络。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
如:共有4点,则每点占25%.相应百分比。
通信网络模拟考试题(附参考答案)
通信网络模拟考试题(附参考答案)一、单选题(共53题,每题1分,共53分)1.下列采用SPF算法的协议是()A、BGPB、EIGRPC、ISISD、RIPv2正确答案:C2.激光器的寿命告警是在阈值电流上升到初始值的()时产生A、50%B、100%C、150%正确答案:C3.交换机的端口有多种类型,下面关于Trunk端口说法正确的是()A、Trunk端口主要用于连接主机B、Trunk端口可以自由设定允许通过多个VLAN ID,这些旧可以与PVID相同,也可以不同C、Trunk口收到的报文中所带的VLAN不在允许通过的VLAN列表中,此报文会在VLAN内广播D、Trunk端口不能设置PVID正确答案:B4.TMS中根据资源命名及定义标准,通常同一个站点的机房如何编号()A、从R01开始递增B、从B01开始递增C、从H01开始递增D、从D01开始递增正确答案:C5.SDH设备和系统的光接口是由ITU-T的()建议规范的B、G.826C、G.957D、G.708正确答案:D6.SDH网元级网管系统不能完成的项目是()A、管理不同的子网B、配置交叉连接数据C、收集告警D、产生告警正确答案:A7.基于MPLS标签最多可以标示出几类服务等级不同的数据流()A、8B、256C、2D、64正确答案:A8.TMS系统中关于检修管理说法正确的是()A、值班工作台的“运行记录”只能由告警转运行、新建产生B、运行管理中没有和实时监视、资源管理的功能交互,是一个独立的功能模块C、检修类别分为临时、计划两种D、检修单流程可以根据网省自己的使用情况进行增减调整正确答案:C9.简单定位系统故障的方法,按优先级从先到后顺序是():1)、使用网管进行故障定位2)、单站自环测试3)、逐段环回方法,注意单双向业务4)、替换单板方法A、1 2 3 4B、3 2 4 1C、4 1 2 3正确答案:A10.从业务申请单中可拆分出()A、缺陷单B、方式单C、检修单D、工作票正确答案:B11.变电站和备用发电机组构成的交流供电系统一般都采用()A、交流供电方式B、集中供电方式C、分散供电方式D、混合供电方式正确答案:B12.TD-LTE传输速率可以达到()A、下行100MB、下行14MC、下行384KD、下行2M正确答案:A13.以下设备中,()主要用于连接几个不同的网段,实现较远距离的无线数据通信A、无线路由器B、无线网关C、无线网卡D、无线网桥正确答案:D14.当电力系统发生故障时,要求继电保护动作,将靠近故障设备的断路器跳开,以缩小停电范围,这就是继电保护的()A、可靠性B、选择性C、快速性D、灵敏性正确答案:B15.()是指在电压允许偏差范围内,电网供电电压的调整使电网高峰负荷时的电压高于低谷负荷时的电压值,使用户的电压高峰、低谷相对稳定A、恒调压方式B、逆调压方式C、顺调压方式正确答案:B16.()开销用于支持光通道的维护和运行A、OTUk开销B、ODUk开销C、OPUk开销D、OCh开销正确答案:B17.单向通道保护环的触发条件是()告警A、MS-AISB、MS-RDIC、LOSD、TU-AIS正确答案:D18.在TMS系统中,用户所属单位必须与()保持一致时才能在告警操作台上对告警进行操作A、统计单位B、维护单位C、权限管辖单位D、隶属单位正确答案:C19.ADSS光缆是指()A、普通光缆B、全介质自承式光缆C、悬挂于地线上的光缆D、特种光缆正确答案:B20.在机房环境检查时,关于机房供电条件检查下面哪项说法是错误的()A、交流电供电满足通信电源的交流电压及其波动范围要求和传输设备功率要求B、直流配电设备满足要求,供电电压满足设备直流电源电压指标C、有足够容量的蓄电池,保证在供电事故发生时,传输设备能继续运行D、当交流电供电设施齐全时,可不提供备用电源正确答案:D21.当被叫振铃时,后向局应向前向局发送()信号A、ACMB、IAMC、ANMD、SAM正确答案:A22.ROADM所能控制的波长范围,与DWDM系统所用的波段适配,其工作范围为()A、1565nm~1625nmB、1530nm~1565nmC、1310 nm~1510 nmD、1527nm~1568nm正确答案:D23.电网运行的客观规律包括()A、瞬时性、快速性、电网事故发生突然性B、变化性、快速性、电网事故发生突然性C、异步性、变化性、电网事故发生突然性D、同时性、平衡性、电网事故发生突然性正确答案:D24.在一条2B+D基本速率用户线上,最多允许几个终端同时工作A、三个B、五个C、一个D、六个正确答案:A25.MPLS-VPN网络中,作为P设备,那么一定需要支持的功能是()A、M-BGPB、LDPC、OSPFD、BGPv4正确答案:B26.Martini方式中,分配VC标签的协议是()A、LDPB、MP-BGPC、RSVPD、手工配置正确答案:A27.如果Ethernet交换机一个端口的数据传输速度是100Mbps,该端口支持全双工通信,那么这个端口的实际数据传输速率可以达到()A、400MbpsB、200MbpsC、50MbpsD、100Mbps正确答案:B28.关于检修票流程,以下说法错误的是()A、下级单位可以发起上级单位设备的检修流程B、省公司影响总部业务的检修票,不影响分部,可以直接送国网信通审批C、检修票在开工阶段可以撤销,终止流程D、检修票可以没有影响业务正确答案:B29.以下内容()是路由信息中所不包含的A、源地址B、路由权值C、目标网络D、下一跳正确答案:A30.IMS中内部功能分为:()、媒体网关控制、出口网关控制、媒体资源处理、归属用户服务A、语音功能B、信令功能C、存储功能D、呼叫会话控制正确答案:D31.阀控式蓄电池额定容量规定的环境温度为()A、35℃B、15℃C、25℃D、30℃正确答案:C32.SDH设备中2048Kb/s电接口,接口码型()A、HDB3B、NRZC、AMID、CMI正确答案:A33.不属于PDH信号进入SDH帧结构中的映射方式是()A、异步映射B、字节同步映射C、比特同步映射D、同步映射正确答案:D34.使用OTDR测试光纤长度时,当设置折射率小于光纤实际折射率时,测定的长度()实际光纤长度A、小于B、大于C、小于等于D、大于等于正确答案:B35.以太网最大传输单元MTU缺省值()A、1500B、1600C、1492D、1512正确答案:A36.IMS功能实体中,()功能实体的作用是用户和业务信息的数据库,用于存储一个域内所有用户的相关数据A、CSCFB、ASC、MRFD、HSS正确答案:D37.SDXC设备时钟自由振荡时的最大频偏不得超过()A、±3.5ppmB、±4.6ppmC、±5.6ppmD、±7.5ppm正确答案:B38.中继器工作于OSI参考模型的哪一层()A、传输层B、物理层C、网络层D、数据链路层正确答案:B39.测量光缆金属护层对地绝缘性能的好坏,一般采用的仪表是()A、直流电桥B、万用表C、高阻计(即光缆金属护层对地绝缘测试仪)D、耐压表正确答案:C40.在OTN中,下面哪个维护信号是从下游站点传往上游站点()A、AISB、LCKC、IAED、BDI正确答案:D41.波分系统常用的PMD补偿方式不包括()A、电域补偿B、光域补偿C、光电混合补偿D、放大补偿正确答案:D42.各种业务信号复用成STM-N的步骤是()A、映射定位复用B、定位复用映射C、定位映射复用D、复用映射定位正确答案:A43.软交换与IAD之间通过何种方式相联()A、E1中继线B、双绞线C、5类线D、IP网络相联,不一定有直接相联的物理链路正确答案:D44.以下不属于无线接人技术的是()A、WLLB、LMDSC、DBSD、PON正确答案:D45.OTN标准的四层复用结构中,光数据单元ODU1的速率接近()A、GEB、2.5GC、5GD、10G正确答案:B46.用户电路、用户集线器、数字交换网络及中继电路等属于程控数字交换机的()A、话路系统B、控制系统C、输入输出系统D、选组级正确答案:A47.在TMS系统缺陷单的流转过程中,()功能会使其变为私有化的操作A、签收工作B、操作C、保存D、追回正确答案:A48.电力网按电压等级的高低,可分为()A、低压和高压;B、低压、中压、高压和超高压、特高压C、低压、高压和超高压D、低压、中压、高压正确答案:B49.OTN网络定义映射和结构的标准协议是()A、G.693B、G.709C、G.981D、G.655正确答案:B50.光纤熔接时,根据自动熔接机上显示的熔接损耗值判断光纤熔接质量,熔接损耗应小于(),不合格应重新熔接A、0.5dBB、0.2dBC、0.1dBD、0.05 dB正确答案:D51.根据STM-N帧速率,可知低阶通道开销字节V5的速率是()A、32kbit/sB、16kbit/sC、8kbit/sD、64kbit/s正确答案:A52.对于1:N的复用段保护,是通过STM-N信号复用段开销中的()字节的通信完成自动保护倒换(ASP)A、K1B、K2C、K3D、K1、K2正确答案:D53.DWDM一般建议采用()光纤A、G.652B、G.653C、G.654D、G.655正确答案:D二、多选题(共25题,每题1分,共25分)1.PTN工程开通初验时,一般要用Smartbits测试以太网业务指标,常测指标为()A、时延B、背靠背C、丢包率D、吞吐量正确答案:ABCD2.IEEE802.2标准中LLC协议的基本功能有以下几项()A、帧的地址编码B、以帧为单位的信息传输C、帧的顺序编码D、通过重发对有差错的帧实现差错控制正确答案:BCD3.()技术属于P2MP技术A、EPONB、GPONC、SDH/MSTPD、P2P Ethernet正确答案:AB4.关于时钟保护配置的原则说法正确的是()A、无时钟保护协议时,时钟网只能配置成单向,且不能成环B、启动标准SSM协议时,时钟可以配置成双向,但不能配置成环。
专业题库-Juniper设备判断(76题)
中 中 中 中 中 中 中 中 中 中 中 中 中 中 中 中 中 中 中 低 中 中 中 中 中 中 低 中 低
C-J-PD-58 C-J-PD-59 C-J-PD-60 C-J-PD-61 C-J-PD-62 C-J-PD-63 C-J-PD-64 C-J-PD-65 C-J-PD-66 C-J-PD-67 C-J-PD-68 C-J-PD-69 C-J-PD-70 C-J-PD-71 C-J-PD-72 C-J-PD-73 C-J-PD-74 C-J-PD-75 C-J-PD-76
中 中 中 中 中 中 中 中 中 中 中 中 中 中 高 高 高 高 低
试题正文
对于TCP 比较友好的限速,是“one rate”? Juniper路由器可以做FTP server Juniper路由器上必须配置root密码。 从Static, RIP, OSPF, 和IS-IS几种协议学到了151.10.0.0/16路由,路由器将优OSPF协议? MAC地址不会在路由表里出现 为了满足子网寻径的需要,路由表中应包含的元素有 源地址、目的网络地址、下一跳地址 RIPv1不能在路由选择刷新报文中携带子网掩码(subnet mask)信息 RIPv2 的更新被送到一个目的地址224.0.0.9 RIP 的更新将被送走,使用UDP port 520 RIP、IS-IS、OSPF、PPP协议属于路由协议 在rip中metric等于16为不可达 IP数据报文在网络层选路时,是基于最长匹配的原则? 服务质量(QoS)定义的相关参数有:吞吐量(带宽)时延 抖动 你可以限制一个用户仅在一个虚拟路由器里作配置 Ctrl+S 可以停止用户屏幕的显示, 正确吗? 当交换矩阵或路由模块切换时, BGP会话连接会断线重连。 Qos 一般开启在出方向? traffic –shaping 功能只能在Qos-profile里才能应用 ,正确吗? 可以对用户某个 TCP 端口,如80进行限速,正确吗? “route-fi缀 rpd软件进程负责操作所有的路由协议? I/O Manager ASIC负责创建J-cells? fe-3/4/2 接口命名正确的表示了一个以太接口位于机箱第4槽,FPC第3槽,PIC上的第2个口?chassis? commit 命令允许路由器使用所有修改过的配置? set generate route 172.16.0.0/17 可以最好的汇聚了下面的路由? 172.16.13.0 /24 IS-IS路由器缺省将所有匹配IS-IS配置的直连路由export到路由表中? 你可以实现一个firewall filter去过滤transit流量,但是需要在某个接口去调用这个filter,比如lo0.0 ? 当需要匹配一个term同时返回一个到源的ICMP消息,firewall filter “reject” 可以执行这种包丢弃?
1JNCIA-ER(JUNIPER路由初级认证)模拟题:认证代码JN0-342
1 。
Which J-Web menu should you use to view the router's "last known good" configuration?BA. Configuration > View and EditB. Configuration > RescueC. Configuration > RollbackD. Configuration > History2 。
Which J-Web window pane allows you to view and manage licenses.DA. MonitorB. ConfigurationC. DiagnoseD. Manage3. Which major J-Web menu should you use to view the physical hardware in the router?DA. ManageB. DiagnoseC. ConfigurationD. Monitor4. You are logged in to an M10i router as the lab user. The J-Web 8.0R2.8 package is located in your home directory.Which CLI command would install the J-Web interface?CA. load software jweb-8.0R2.8-signed.tgzB. load software /home/lab/jweb-8.0R2.8-signed.tgzC. request system software add jweb-8.0R2.8-signed.tgzD. request system software add /home/lab/jweb-8.0R2.8-signed.tgz5. Which J-Web menu displays the amount of free space on the router's compact flash?CA. Manage > SystemB. Diagnose > FlashC. Monitor > SystemD. Monitor > Flash6. What is the purpose of the services interface?AA. Processes traffic using class-of-service.B. Provides various layer 2 and layer 3 services.C. Used to bundle Ethernet interfaces on M-series routers.D. Allows for secure shell access to the router.7. Which definition most accurately describes VRRP?AA. An election protocol used to designate one of multiple routers as the master router, which serves as the forwarding next-hop for the LAN.B. A virtual protocol which makes VPN communications possible.C. A redundancy protocol used to identify the active WAN circuit.D. A link-state routing protocol used in Ethernet environments.8. Which three daemons are contained in the JUNOS software?BCDThere are 3 correct answersA. VPNB. Routing ProtocolC. ManagementD. Chassis9. Which two statements regarding the JUNOS software user authentication methods are correct?CDThere are 2 correct answersA. Multiple users can authenticate using a common local user account.B. Only one authentication method can be configured.C. Multiple authentication methods can be configured.D. All users must be configured locally on the router.10. Which CLI command displays the hardware currently installed in the router?CA. show chassis alarmsB. show system hardwareC. show chassis hardwareD. show system environment11. Which statements are true regarding DHCP services and J-series routers?BCThere are 2 correct answersA. J-series routers can operate as a DHCP-relay agent only.B. J-series routers can operate as a DHCP server.C. J-series routers can function as a DHCP-relay agent and DHCP server simultaneously.D. J-series routers can relay DHCP requests from one LAN to another.12. Which CLI command displays any active alarms on the router?BA. show system alarmsB. show chassis alarmsC. show system environmentD. show chassis environment13. Which configuration statement contacts a TACACS+ server when the primary RADIUS server is unreachable?CA. [edit] system { authentication-order [ radius tacacs+ ]; }B. [edit] authentication { login-order [ radius tacplus ]; }C. [edit] system { authentication-order [ radius tacplus ]; }D. [edit] authentication { login-order [ radius tacplus ]; }14. What are three characteristics of the JUNOS software?ABCThere are 3 correct answersA. Contains a modular operating system.B. Separate forwarding and control planes.C. Single software train for all M,T and J-series routers.D. Contains easy to read registry keys.15. What statements about ALGs are true?There are 2 correct answersA. ALGs monitor protocol exchanges and perform address and port translations within the payload for certain protocols.B. ALGs allow the router to interact with layer 4 and above when performing translation services.C. ALGs are required whenever NAT is used.D. ALGs are only used when PAT is configured.16. Which type of IGP should you use to achieve scalability in a large enterprise network?BA. distance-vector protocolB. link-state protocolC. Bellman-Ford protocolD. path-vector protocol17. What are two services provided by the SDX?ACThere are 2 correct answersA. customized firewall modificationsB. an XML interface for router configurationC. usage tracking and accountingD. secure remote access to the router18. Which statements are true regarding the ASM?CDA. The ASM supports only layer 3 services.B. The ASM comes standard with all M7i and M10i routers.C. The ASM supports the layer 2 and layer 3 service packages simultaneously.D. The ASM is an option when ordering the M7i.19. You have a router which does not have the J-Web interface installed by default.CWhich CLI command installs the J-Web package?A. load system software jweb-8.0R2.8-signed.tgzB. install package jweb-8.0R2.8-signed.tgzC. request system software add jweb-8.0R2.8-signed.tgzD. package add jweb-8.0R2.8-signed.tgz20. Which VRRP configuration option monitors the state of an interface and is capable of initiating a change in mastership if the monitored interface goes down?CA. snoopB. monitorC. preemptD. track21. Which JUNOS software feature forms the basis for JUNOScope?BA. J-WebB. JUNOScriptC. BSD KernelD. SDX22. Which configuration option allows you to view autoinstallation messages?AA. traceoptionsB. debugC. viewD. decode23. Which of the following address assignment options are available when configuring NAT?AB There are 2 correct answersA. StaticB. DynamicC. One-to-oneD. One-to-many24. Within the J-Web initial setup wizard, which menu is used to configure the hostname of the router?AA. Set UpB. InterfacesC. UsersD. Routing25. Which MLPPP configuration statement determines the threshold for maintaining the state of an MLPPP bundle?BA. link-limitB. link-thresholdC. minimum-thresholdD. minimum-links。
华为中级认证路由题库
1.某公司为其一些远程小型站点预留了网段,每一个站点有10 个IP 设备接到网络,下面的哪个 VLSM 掩码能够为该需求提供最小数量的主机数目?A./27B./28C./29D./302.网段,可以提供多少主机地址?3.判断:CIDR 使用VLSM 技术,突破了传统IP 地址分类边界,采用CIDR 可以把路由表中的若干条路由汇聚为一条路由,减少了路由表的规模。
4.汇总地址包含哪些子网?5.下面哪个地址可以配置在主机设备上?类地址子网掩码为,则每个子网可用主机地址数是:7.一台主机的地址为,则该主机需要发送广播报文,该报文发往的目的地址应该为?8.有一个子网网段地址是,掩码是,则该网段允许的最大主机IP 地址是:9.判断:网络设计采用分层的结构,一般可分为:核心层、汇聚层、接入层三层10.在对网络地址进行子网划分时,能得到如下哪个合法化的VLSM 子网?11.判断:可以为设备配置IP 地址,掩码为。
12.路由器收到一个数据包,其目标地址为,该地址属于以下哪个子网?13.当前正在使用地址空间,想通过子网掩码来划分该地址空间分给WAN链路使用。
一共能够为该WAN 链路提供多少个子网?14.一个C 类网络至少需要划分成5 个子网,每个子网最多20 台主机,则适用的子网掩码是15.汇聚路由包含了多少C 类网络?16.对于网段,能够分配给主机最大的IP 地址是哪个?17.对于网段,下面哪个地址可以分配给主机?18.下面关于VLSM 特征的描述,不正确的有(请选择2 个答案)A.它能够支持IPv4 和IPv6B.它提供了重叠的地址范围C.在路由表中它考虑到了更好的路由聚合信息D.它允许子网能够进一步被划分为更小的子网19.网段被分割成了8 个子网。
下面IP 地址哪些能够分配给第二个子网的主机?20.某公司申请到了一个C 类地址,但是要连接6 个子公司,最大的子公司有30 台计算机,每个子公司在一个网段中,则子网掩码应设为?21.现在有一个C 类地址块,需要将该地址块划分9 个子网,每个子网最多有16 台主机,那么下面哪个子网掩码合适?D.没有合适的子网掩码22.网络管理员需要建立一个包含10 台主机的小型网络,ISP 只分配了一个公网IP 地址作为出口地址,网管员可以使用以下哪个地址块来规划内网?23.下面哪些IP 地址不是网络地址? (请选择2 个答案)子网划分的不具备的优点有(请选择2 个答案)A.节约IP 地址B.提高网络QoSC.提升IP 地址使用效率D.提高网络可靠性25.下面可以出现在公网上的地址有(请选择3 个答案)26.判断:路由、、、可以聚合为。
专业题库-Juniper设备单选(144题)
答案: B
C-J-DX-11
QoS
低Hale Waihona Puke 以下哪些不是实现Qos常用的技术:( A、队列调度; B、流分类; C、划分Vlan D、WRED
)。 答案: C
C-J-DX-12
QoS
低
什么方法可以使一个应用获得更多的带宽?( ) A:使用QoS机制一个应用程序在与其他应用竞争中获得更多的带宽 B:载荷压缩 C:包头压缩 D:以上全部
答案:D
C-J-DX-38
MPLS
用户通过以太接入方式接入路由型MPLS VPN,PE-CE之间优先采用何种路由协议? A:OSPF路由协议 B:RIP路由协议 C:静态路由协议 D:BGP路由协议
答案:D
C-J-DX-39
MPLS
高
有两个不同公司,已分别基于CMNET组建了一个全网状的路由型MPLS VPN网络;由于公司重组合并, 要求将两个VNP网络合并,实现两个公司之间互访,并且网络割接影响用户最少,请选择最优的割接 方案: A:两个VPN都统一使用一新个RD和RT,降低组网的复杂性 答案:C B:在VRF定义修改中,两个VPN使用相同的RD;在原有import RT基础上,增加另外一个VPN的 RT属性 C:在VRF定义修改中,维持原有各自的VPN RD,在原有import RT基础上,增加另外一个VPN的 RT属 性 D:以上情况都不是 用户接入路由型MPLS VPN,PE-CE之间尽量避免采用ISIS等链路状态路由协议,请选择其中一个最 合理理由? A:PE-CE不需要实现快速路由收敛,没有必要允许状态路由协议 B:PE性能扩展型的考虑 C:状态路由协议对CE设备要求高 D:状态路由协议容易受到安全攻击
C-J-DX-40
通信网络考试题与答案
通信网络考试题与答案一、单选题(共53题,每题1分,共53分)1.光纤数字通信系统中不能传输HDB3码的原因是A、光源不能产生负信号光B、将出现长连“1”或长连“0”C、编码器太复杂D、码率冗余度太大正确答案:A2.在IS-IS的广播网络中,level-1路由器使用哪个组播MAC地址作为发送IIH的目的地址()A、0180-c200-0014B、0180-c200-0016C、0180-c200-0015D、0100-5E00-0002正确答案:A3.在后备式UPS中只有当市电出现故障时()才启动进行工作A、滤波器B、电池充电电路C、逆变器D、静态开关正确答案:C4.软交换体系中由哪个设备具体完成呼叫路由的选择()A、路由器B、MGWC、GKD、Softswitch正确答案:D5.ADSS光缆运行时最主要的注意问题是()A、防雷B、防电腐蚀C、防渗水及防潮D、防外力破坏正确答案:B6.由于隔离开关没有(),因此严禁带负荷拉刀闸A、灭弧装置B、大容量的辅助触头C、操作机构D、大容量的主触头正确答案:A7.用户A通过计算机网络向用户B发消息,表示自己同意签订某个合同,随后用户A反悔,不承认自己发过该条消息为了防止这种情况发生,应采用()A、数字签名技术B、消息认证技术C、数据加密技术D、身份认证技术正确答案:A8.ISO提出OSI的关键是()A、提高网络速度B、为计算机制定标准C、系统互联D、经济利益正确答案:C9.关于L-16.2类型激光器的描述,错误的是()A、此激光器是定波长激光器B、激光器信号速率为STM-16C、工作在1550窗口,使用G.652和G.654光纤D、用于局间长距离传输正确答案:A10.变压器励磁涌流是指变压器全电压充电时在其绕组中产生的()A、暂态电流B、动态电流C、静态电流D、线电流正确答案:A11.四级网包含的站点电压等级为()A、一般指220kVB、一般指500kV以上C、一般指35kV、110kVD、一般指380V、500kV,750kV等正确答案:C12.TMS系统主页上有关告警指标的统计的是哪类告警信息()A、衍生告警B、根告警C、独立告警D、全量告警正确答案:B13.IMS会话建立的媒体协商过程中,200OK是对所协商媒体类型和编码方案的确认,是主、被叫间交互信息的()A、第一个SDP提供B、第一个SDP应答C、第二个SDP提供D、第二个SDP应答正确答案:D14.公司调度交换网在编号方式上,调度交换网用户的全编号为()位编号A、9B、8C、6D、7正确答案:A15.CSCF与HSS间是下面哪个接口A、ISCB、RfC、CxD、Sh正确答案:C16.IPV6的地址是()比特A、128B、64C、256D、192正确答案:A17.在SDH网播中,STM-l能承载()个El信号A、21B、63C、155D、2016正确答案:B18.在MPLS交换中,针对标签会有不同的操作类型,其中“pop”动作的含义是()A、在MPLS标签栈中加入顶部标签B、在MPLS标签栈中移除顶部标签C、将顶部标签替换成另外一个数值D、将顶部标签替换成另一组标签正确答案:B19.IP报文头中固定长度部分为多少字节A、40B、30C、10D、20正确答案:D20.TMS系统中方式单在线编制,是对于以下哪类设备()A、手动录入TMS系统的SDH传输设备B、通过网管北向接口自动采集的光传输设备C、手动录入TMS系统数据通信网设备D、通过网管北向接口自动采集的交换设备正确答案:B21.配置实现STP协议时,网络中每台运行STP协议的交换机都有一个唯一的交换机标识,该标识是()A、两字节长度的交换机优先级B、六字节长度的MAC地址C、两字节长度的交换机优先级和六字节长度的MAC地址D、六字节长度的交换机优先级和六字节长度的MAC地址正确答案:C22.SDH同步网定时基准传输链上,在两个转接局SSU之间的SDH设备时钟数目不宜超过()个A、10B、20C、60D、99正确答案:B23.OTN的分层结构在原有的SDH上增加了()A、光通道层B、光传输媒质层C、复用段层D、客户层正确答案:A24.用以提高输电线路供电可靠性和电力系统运行稳定性的安全自动装置是()装置A、自动并列B、自动重合闸C、按频率自动减负荷D、备用电源自动投入正确答案:B25.在北美,ISDNPRI包含()个B信道A、2B、23C、30D、1正确答案:B26.3个维度以上的ROADM单元通常会选用何种技术实现()A、平面光波电路型()B、波长阻断器型()C、波长选择开关()D、波长调制型()正确答案:C27.()用于支持客户信号适配A、OTUk开销B、ODUk开销C、OPUk开销D、OCh开销正确答案:C28.OSPF属于()类型的路由协议A、混合B、链路状态C、生成树协议D、距离矢量正确答案:B29.TMS通道资源信息管理中,通道状态包括淡绿色、()、和红色A、灰色B、蓝色C、橙色D、黄色正确答案:C30.IMS中内部功能分为:()、媒体网关控制、出口网关控制、媒体资源处理、归属用户服务A、呼叫会话控制B、信令功能C、存储功能D、语音功能正确答案:A31.高阶虚容器帧的首字节是()A、G1B、J1C、C2D、B3正确答案:B32.光纤通信的原理是光的()A、透视原理B、全反射原理C、光的衍射原理D、折射原理正确答案:B33.测量光缆金属护层对地绝缘性能的好坏,一般采用的仪表是()A、直流电桥B、耐压表C、高阻计(即光缆金属护层对地绝缘测试仪)D、万用表正确答案:C34.TMS系统中动静态数据关联不包括()A、业务通道关联B、设备上架C、配线链接D、字段补充正确答案:D35.在TCP三次握手中,对于报文SYN(seq=b,ack=a+1),下列说法正确的有()A、对序号为b的数据包进行确认B、对序号为a+1的数据包进行确认C、下一个希望收到的数据包的序号为bD、下一个希望收到的数据包的序号为a+1正确答案:D36.ARP协议报文分为ARPRequest和ARPResponse报文在网络中使用()方式传送A、多播B、单播C、组播D、广播正确答案:D37.TMS系统中,节假日维护由()单位维护A、国网信通B、分部C、省公司D、总部正确答案:A38.IMS交换网中用户数据信息存储在以下哪个功能实体中()A、MGCFB、S-CSCFC、HSSD、SBC正确答案:C39.OTN系统中,OTU1的帧结构大小为4*4080字节,那么OTU2的帧结构大小为()A、16*4080B、8*4080C、4*4080D、32*4080正确答案:C40.MPLS根据标记对分组进行交换,其标记中包含()A、MACB、IP地址C、VLAN编号D、分组长度正确答案:B41.按照国家光缆线路质量评定标准,光缆固定接头损耗应不大于()A、0.5dB/个B、0.2db/个C、0.08dB/个D、0.1db/个正确答案:A42.BGP将尝试进行TCP连接的建立,但是连接失败的一个状态是()A、IdleB、ConnectC、ActiveD、OpenSent正确答案:C43.目前系统告警定性有检修引起、方式引起、缺陷引起和误告、用户侧原因等,当告警被定性为方式引起时,需要调度员手动关联相应的()A、检修票B、工作联系单C、方式单D、缺陷单正确答案:C44.通信资源通常可分为物理资源和逻辑资源,下列()不属于物理资源的范畴A、网元B、区域C、机架D、站点正确答案:A45.BGP协议使用的传输层协议和端口号是()A、UDP,176B、UDP,179C、TCP,176D、TCP,179正确答案:D46.TMS系统,月累计告警处理率,持续时间小于()分钟的未处理根告警不纳入统计A、15B、60C、30D、10正确答案:A47.使用OTDR可以测试到的光纤的指标为()A、光纤发光强度B、光纤折射率C、光纤骨架结构D、光纤断点正确答案:D48.抖动是指数字信号的特定时刻相对其理想时间位置的短时间偏离所谓短时间偏离是指变化频率高于()的相位变化A、5HzB、10HzC、15HzD、20Hz正确答案:B49.决定光纤通信中继距离的主要因素是()A、光纤的型号B、光纤的损耗和传输带宽C、光发射机的输出功率D、光接收机的灵敏度正确答案:B50.ADSL的不对称性是指()A、上下行线路长度不同B、上下行线路粗细不同C、上下行速率不同D、上下行信号电压不同正确答案:C51.下面属于光纤光学特性的是()A、损耗、带宽B、折射率、数值孔径、截止波长C、纤芯、包层直径、偏心度正确答案:B52.在正弦交流电路中,理想电容元件的端电压和流过它的电流的相位关系是()A、电压与电流同相位B、电压超前电流90°C、电压与电流的相位差在0°~60°之间D、电压滞后电流90°正确答案:D53.测量接地电阻时,为保证有零电位区间应使电流回路的两极有足够大的间距,一般为()米A、60B、80C、40D、20正确答案:C二、多选题(共25题,每题1分,共25分)1.节点从时钟有的工作方式包括()A、保持工作方式B、锁定工作方式C、自由运行方式D、搜索运行方式正确答案:ABC2.TD-SCDMA技术体制的核心网与()技术体制一样,也是基于()网络的演进,并最终向()网络结构演进A、WCDMGSM/GPRSB、GSM/GPRS、WCDMAC、GSM/GPRS、CDMA2000D、全IP正确答案:AD3.LTE组网,可以采用同频也可以采用异频,以下()是正确的A、10M同频组网相对于3*10M异频组网,算法复杂度要高B、10M同频组网相对于3*10M异频组网可以提升边缘用户速率C、10M同频组网相对于3*10M异频组网,小区间干扰更明显D、10M同频组网相对于3*10M异频组网可以更有效的利用资源,提升频谱效率正确答案:ACD4.OPGW可提供的功能包括()A、充当输电线B、避雷C、通信D、充当地线正确答案:BCD5.SDH网络管理系统结构对应的网管系统分别为()A、网络级网管NMSB、网元级网管EMSC、网元设备NED、子网管理级系统SMS正确答案:ABC6.OTN波长稳定技术包括()A、波长集中监控B、温度反馈C、波长反馈D、放大反馈正确答案:ABC7.单模光纤的色散主要包括()A、波导色散B、模间色散C、材料色散D、偏振模色散正确答案:AC8.在TMS系统中设备组件类别分别有()A、端口B、机框C、机槽D、板卡正确答案:ABCD9.软交换与现有的H.323网络互通时,软交换可以充当()A、GKB、MGC、GWD、MGC正确答案:AC10.G.652光纤的主要参数的规范有()A、模场同心度误差B、衰耗系数C、截止波长D、模场直径正确答案:ABCD11.目前PTN所定义的保护倒换技术包括()A、环网SteeringB、环网WrappingC、线性1+1D、线性1:1正确答案:ABCD12.卫星通信中,常见的多址技术有()及几种多址技术的组合A、FDMAB、TDMAC、CDMAD、SDMA正确答案:ACD13.按结构形式分,光缆的种类有()A、骨架式B、层绞式C、中心束管式D、带状正确答案:ABCD14.程控交换机中处理机的配置通常有()两种A、整体控制B、分散控制C、集中控制D、局部控制正确答案:BC15.光纤数字通信系统光性能参数中,与误码率有关的是()A、平均发送光功率B、光接收灵敏度C、过载光功率D、动态范围正确答案:BCD16.下列信令属于局间信令的是()A、交换机与交换机之间传送的信令B、交换机与网管中心之间传送的信令C、直流脉冲信令D、双音多频信令正确答案:AB17.实行通信电源集中监控的主要作用是()A、提高设备维护和管理质量B、降低系统维护成本C、提高整体工作效率D、提高整体防雷效果正确答案:ABC18.我国电力系统中性点运行方式有()A、中性点直接接地B、中性点间接接地C、中性点不接地D、中性点经消弧线圈接地正确答案:ACD19.EPON采用()方式管理和控制ONU/ONTA、MPCPB、OAMC、PLOAMD、OMCI正确答案:AB20.重要线路保护及安全自动装置通道应具备两条独立的路由,满足“()”的要求A、双光缆B、双路由C、双设备D、双电源正确答案:BCD21.OSPF的Hello报文包含丰富的信息,()属于报文的信息A、目标路由器接口的地址掩码B、DR和BDRC、始发路由器接口的认证类型和认证信息D、路由器的优先级正确答案:BCD22.以下是时钟抖动产生的原因有()A、由于昼夜温差产生B、传输系统产生C、设备内部噪声引起的信号过零点随机变化D、时钟自身产生正确答案:BCD23.TMS系统中缺陷影响最高单位包括()A、省公司B、总部C、分部D、县公司正确答案:ABCD24.光时域反射仪可测试的主要参数有()A、测纤长和事件点的位置B、测光纤全回损C、测光纤的衰减和衰减分布情况D、测光纤的接头损耗正确答案:ABCD25.关于WCDMA与GSM网络规划差异的说法正确的是()A、GSM系统的容量和覆盖可以单独进行规划B、WCDMA系统不需要频率规划C、WCDMA系统的容量和覆盖必须联合起来规划D、WCDMA系统和GSM系统都导频污染问题正确答案:BC三、判断题(共25题,每题1分,共25分)1.WCDMA系统是干扰受限系统A、正确B、错误正确答案:A2.电压等级在330至1000kV之间的电力网称为高压电网A、正确B、错误正确答案:B3.DHCP的含义是动态主机配置协议A、正确B、错误正确答案:A4.如果某STM-1在复接到STM-4时的间插层数为2,则该STM-1中的J0字节在STM-4中的位置是S(1,30,2)A、正确B、错误正确答案:B5.OTN的基本单位为OTU1、OTU2、OTU3,其帧结构不一样,但帧频一样A、正确B、错误正确答案:B6.LTE对比3G有显著的提高了峰值传输数据速率,例如下行链路达到50Mb/s,上行链路达到100Mb/sA、正确B、错误正确答案:B7.BGP选路规则中,MED值高的路由优先A、正确B、错误正确答案:B8.由于属性AS-PATH不能在AS内起作用,所以规定BGP路由器不会宣告从IBGP对等体来的更新信息给其他IBGP对等体A、正确B、错误正确答案:A9.接地系统按照功能来分有工作接地、保护接地和防雷接地三种A、正确B、错误正确答案:A10.OSPF网络类型中路由器必须选择DR和BDR,否则无法工作A、正确B、错误正确答案:B11.Discarding状态下端口对接收到的数据做丢弃处理,端口不转发数据帧,但学习MAC地址表A、正确B、错误正确答案:B12.ITU-TG.692建议,DWDM不同波长的频率间隔应为100THz的整数倍A、正确B、错误正确答案:B13.在WDM中通道的等间隔是在波长上保持的均匀间隔A、正确B、错误正确答案:B14.我国使用的PRI为30B+D方式,总速率达2.048MbpsA、正确B、错误正确答案:A15.OTDR仪表的动态范围是初始背向散射电平与噪声底电平之和A、正确B、错误正确答案:B16.继电保护动作速度愈快愈好,灵敏度愈高愈好A、正确B、错误正确答案:B17.接地电阻越小过电压值越高,因此在经济合理的前提下应尽可能降低接地电阻A、正确B、错误正确答案:B18.Http(超文本传输协议)默认的端口号是21A、正确B、错误正确答案:B19.OTN的体系继承了SDH/SONET的复用和映射架构,同时具备对大颗粒业务的灵活调度的电交叉能力A、正确B、错误正确答案:A20.OTN是面向传送层的技术,内嵌标准FEC,在光层和电层具备完整的维护管理开销功能,对于大小颗粒业务都适用A、正确B、错误正确答案:B21.OPGW应经得起不小于95%RTS的拉力而无任何单线断裂A、正确B、错误正确答案:A22.在数字网同步中的“同步”包括比特定时和帧定时这两层含义A、正确B、错误正确答案:A23.定时链路组织应遵循由上及下的原则,定时基准信号应从上级节点向下级节点或同级节点之间进行传送A、正确B、错误正确答案:A24.机房环境不佳极易导致各种硬件故障,所以在建设机房时必须先做好防雷接地及供电电源、室内温度、室内湿度、防电磁干扰、防静电等环境的建设,为网络设备的正常工作提供良好的环境A、正确B、错误正确答案:A25.面向连接服务不能防止报文的丢失、重复或失序A、正确B、错误正确答案:B。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
享是一种美分享是一种美德分享是一种美德享是一种Q. Which attributes are automatically updated when a BGP update is sent to an EBGP neighbor? (choose 2) A,DA. BGP Next-hop attributeB. Local Preference attributeC. Multi Exit Descriminator (MED) attributeD. AS-Path attributeE. Origin attributeQ. Which statements are true about post-service-filters? (choose 3) A,C,D A. A post-service-filter can only be used on inputB. A post-service-filter can be used on input, output or bothC. A post-service-filter is only applied to packets that are processed by a service-setD. A post-service-filter is a standard stateless firewall-filterQ. For a given prefix 10.10.10.0/23 learned as an OSPF Internal Intra-Area, an OSPF Internal Inter-Area and an OSPF AS External type 1, which route will be preferred? AA. OSPF Internal Intra-Area routeB. OSPF Internal Inter-Area routeC. OSPF AS External type 1D. Equal cost load sharing will occur if equal cost paths existQ. Your enterprise is dual-homed to the same Service Provider using BGP, with two links having bandwidth of STM1/OC3 and STM4/OC12 respectively. You want to influence all traffic leaving your autonomous-system to use the STM/OC12 link.Which BGP attributes can you modify to accomplish this goal? (choose 2) B,DA. Set Local Preference in an import policy for routes learned from the neighbor on the STM4/OC12 link to be 80B. Set Local Preference in an import policy for routes learned from the neighbor on the STM4/OC12 link to be 180C. Configure the import-policy for the STM4/OC12 neighbor to set the ORIGIN attribute to be INCOMPLETED. Configure the import-policy for the STM1/OC3 neighbor to as-path prepend the neighbors autonomous-system twiceE. Configure the import-policy for the STM4/OC12 neighbor to as-path prepend the neighbors autonomous-system twiceQ. In the exhibit, which export policy or policies will be applied to BGP neighbor 10.10.10.1? CA. global-policyB. group-policyC. nbr-policyD. all three policiesE. none of the policiesQ. Which steps are required to configure an interface-style service set? (choose 5) A,B,C,D,FA. Configure the service interfaceB. Configure the service rules and rule-setsC. Configure the service-set to include the service rules and/or rule-setsD. Configure the service-set to be interface-style and which service interface to useE. Configure routing to the service interfaceF. Apply the service-set to the required interfacesQ. Which step is not recommended as part of a seamless RIP to OSPF IGP transition using the overlay method? CA. Configure all routers to ensure the existing RIP IGP has a better route preference than the new OSPF IGPB. Configure all routers to run OSPFC. Redistribute all RIP routes into OSPF and vise versaD. Ensure all routers have learned all networks via OSPFE. Gracefully transition to OSPF by changing the route-preference of RIP to be higher than OSPFQ. Which configuration step is required when configuring an OSPF NSSA area? C2007-10-28蚂蚁倾情奉献享是一种美分享是一种美德分享是一种美德享是一种 A. You must configure nssa on all routers in the network B. You must configure nssa under [ edit protocols ospf ]C. You must configure nssa under [ edit protocols ospf area ]D. You must configure nssa only on the Area Border Routers (ABR's)Q. Which statements below are valid JUNOS stateful-firewall rule match types? (choose 3) A,B,DA. destination-address-rangeB. source-prefix-listC. esp-spiD. applicationsE. interface-set Q.In the exhibit, which statement is true for the static route 11.11.11.0/24 that is evaluated against the BGP export policy chain? DA. The 11.11.11.0/24 prefix is accepted by policy P1 and advertised to neighbor 10.10.10.1B. The 11.11.11.0/24 prefix is rejected by policy P1 and not advertised to neighbor 10.10.10.1C. The 11.11.11.0/24 prefix is rejected by the policy P2D. The 11.11.11.0/24 prefix is rejected by the BGP default policyE. The 11.11.11.0/24 prefix is accepted by the BGP default policyQ You want to determine which NAT pools have been configured on the router. Which command will display this information (choose 1) DA. show services nat available poolsB. show services poolsC. show services nat-pool-tableD. show services nat poolsQ Which statements best describe Enterprise connections to Service Providers? (choose 2) C,DA. Enterprises should always run BGP with their Service Providers when their CPE router has parallel multiple links to the ISP routerB. When BGP is run in an enterprise network, all routers need to run BGPC. Enterprises should use a static default route when there is only one entry/exit point out of their networkD. Enterprises should use BGP when they are multi-homed and have a need to exercise policy controlsQ Assuming the requirements for the establishment of an EBGP session between the loopback0 interfaces of both routers. The local autonomous-system is defined as AS100 and the neighbors autonomous-system is AS200. The local autonomous-system is configured under [ routing-options autonomous-system 100 ] Which statement is not true about Multihop External BGP peering sessions? AA. Both peer-as 200 and type external parameters are requiredB. Only peer-as 200 is requiredC. You must configure the local-address parameterD. You must configure the ttl for the multi-hop neighbor(s)E. The local router must have a route to the eBGP neighbors configured addressQ In the exhibit, which statements are true for the NAT translation? (choose 2) B,CA. The private/internal IP address that will be changed is 192.168.11.4B. The private/internal IP addresses that will be changed are 10.222/16C. The public/external IP address is 192.168.11.4D. The private/internal IP addresses can be anythingE. The public/external IP address is 10.222.44.1Q While monitoring the systems messages file, you encounter an entry that is frequently repeated, but seems somewhat cryptic2007-10-28蚂蚁倾情奉献享是一种美分享是一种美德分享是一种美德享是一种Jun 8 14:12:28 R1 chassisd[2737]: CHASSISD_IFDEV_DETACH_PIC: ifdev_detach_pic(0/3)Which command can you use to better understand the significance of this message? CA. show syslog message CHASSISD_IFDEV_DETACH_PICB. show system message CHASSISD_IFDEV_DETACH_PICC. help syslog CHASSISD_IFDEV_DETACH_PICD. show system error log CHASSISD_IFDEV_DETACH_PICQ In the exhibit, which statements are valid entries for the "State" field? (choose 3) B,D,EA. MonitorB. WatchC. ListenD. DropE. ForwardQ The security policy for your company specify that access for all operations staff to network devices will migrate to the TACACS+ protocol. The RADIUS protocol is currently deployed and will be the preferred method for authenticationWhat configuration is required on the JUNOS routers to ensure that only when network connectivity issues resulting in the TACACS+ and RADIUS being inaccessible allow locally defined users to login to the routers? CA. set system authentication-order [radius tacplus password]B. set system authentication-order [tacplus radius password]C. set system authentication-order [radius tacplus]D. set system authentication-order [tacplus radius]Q Which statements are true about Queuing on M-Series and J-Series routers (choose 3) B,C,EA. All M-Series routers support up to 8 hardware queuesB. All J-Series routers support up to 8 queuesC. Forwarding-classes map to queuesD. Voice Traffic is automatically classified as expedited-forwarding (EF) and sent to queue 1E. The default queue/forwarding class associations are a. Queue 0 - best-effortb. Queue 1 - expedited-forwardingc. Queue 2 - assured-forwardingd. Queue 3 - network-controlQ You need to determine which VPN technology is best suited to provide enterprise branch office connectivity. The requirements are that the solution should be:cost-effective does not have stringent security requirements need not support legacy protocols should be simple to manage for the customershould also provide Internet access on the same physical interface Which technologies/solutions are best suited? DA. Traditional overlay L2VPN based on Frame-Relay, ATM or Leased linesB. MPLS based L2VPNC. IPSec VPND. MPLS based L3VPNE. GRE tunnel VPNQ You need to ensure that a branch office which is connected to the Service Provider with a link speed of 128K does not get overwhelmed with traffic from the head office which has a link speed of 2Mbps. Juniper Networks J-Series routers are deployed as CPE devices in both locations. Which mechanism is best suited? DA. Police traffic exceeding 128Kbps to the branch site at the head officeB. Upgrade the branch sites bandwidth to 2 Mbps to ensure traffic limits are not exceededC. Apply Class of Service to ensure that the most important traffic is prioritizedD. Apply JUNOS Virtual Channels at the head office to ensure branch office sites are not overwhelmed with too much trafficQ Which statements are true regarding Class of Service configuration in JUNOS? (choose 4) A,C,D,EA. Behavior Aggregate (BA) classifiers are configured under [edit class-of-service classifiers]B. Behavior Aggregate (BA) classifiers are applied under2007-10-28蚂蚁倾情奉献享是一种美分享是一种美德分享是一种美德享是一种[edit interfaces class-of-service]C. scheduler-maps are needed to link forwarding-classes to schedulersD. RED/WRED profiles configured under [edit class-of-service drop-profiles] must be referenced in schedulers to take effectE. Rewrite-rules are configured under [edit class-of-service rewrite-rules] and must be applied to the logical interfaces defined under [edit class-of-service interfaces]F. Schedulers are configured under [edit class-of-service schedulers] and may include a. forwarding-class b. transmit-rate c. priority d. buffer-sizeQ Which statements are true about Policing/Rate Limiting (choose 2) A,CA. Policing is a useful tool for protecting the network from non-compliant sourcesB. Token-bucket policers can not be used on all interface typesC. Policers can be used to protect the network against DoS/DDoS attacksD. Policers can only be configured on ingressQ Which command can be used to determine which sockets the router has in either a listen or established state? BA. show netstat socketsB. show system connectionsC. show running protocolsD. show connections upQ During the establishment of an IPSec VPN, the routers negotiate which parameters will be used for the establishment of the IPSec Security Association (SA) using proposals that define these parameters.Which statements are true about configuring IPSec proposals? (choose 3) C,D,F[edit services ipsec-vpn ipsec proposal p1]luser@Junos-router#A. set authentication algorithm blowfishB. set encryption algorithm rsaC. set encryption algorithm aes-256-cbcD. set protocol espE. set protocol ipF. set lifetime 86400Q You need to verify that the IPSec VPN that you have just configured on a J-Series router is operating correctly.Which commands could be used to verify this? (choose 2) C,DA. show ike security-associationsB. show ipsec security-associationsC. show services ipsec-vpn ike security-associationsD. show services ipsec-vpn ipsec security-associationsQ Which statements are true for Class of Service ingress processing (choose 2) B,EA. Rewrite codepointsB. Multifield classificationC. SchedulingD. ShapingE. RateLimiting/PolicingQ. Which three commands are valid syntax?' A,C,D A. set then reject2007-10-28蚂蚁倾情奉献享是一种美分享是一种美德分享是一种美德享是一种B. set then discard C. set then acceptD. set then next-policyE. set then metric2 20 acceptQ. Which configuration step is required when configuring an OSPF NSSA area? CA. You must configure nssa on all routers in the networkB. You must configure nssa under [ edit protocols ospf ]C. You must configure nssa under [ edit protocols ospf area ]D. You must configure nssa only on the Area Border Routers (ABR's)Q. Which statement is true about prefix-lists? (choose 2) B,CA. They are always exact matches when used in firewall-filtersB. They are always orlonger matches when used in firewall-filtersC. They are always exact matches when used in routing policiesD. They are always orlonger matches when used in routing policiesQ. You are at the [ firewall family inet filter actions term u-decide] Yoiurconfiguration hierarchy.Which three commands are valid syntax? A,C,EA. set then reject tcp-resetB. set then source-class <SCU>C. set then accept log syslog sample count PKTSD. set then next-policyE. set then forwarding-classQ. Which statement is true if a route does not match any terms in a policy chain? D A. The route is automatically acceptedB. The route is automatically rejected',falseC. The accept/reject decision must be specified in the final policy',falseD. The accept/reject decision is based on the protocols default policyQ. Which OSPF LSA is not flooded in an OSPF Stub Area? D A. Router LSA\'s (Type 1)B. Network LSA\'s (Type 2)C. Summary LSA\'s (Type 3)D. ASBR Summary LSA\'s (Type 4)Q. Which statement is true for the order of the selection of the BGP active route? DA. AS-Path -> Local-Preference -> Origin -> MEDB. MED -> Origin -> AS-Path -> Local-PreferenceC. Local-Preference -> Origin -> AS-Path -> MEDD. Local-Preference -> AS-Path -> Origin -> MEDQ. Which statements are true about Internal BGP configurations? (choose 3) B,C,DA. Only directly connected neighbors need be configuredB. Usually the IP address of the loopback0 interface is used for the IBGP sessionsC. Use of the local-address configuration statement is requiredD. The IGP is used to route packets between remote neighborsE. When multiple links exist between neighbors, there needs to be multiple neighbors configured Q. In a network which does not use Route Reflectors, which statements are true about BGP readvertisement rules? (choose 2) B,EA. When learned from External BGP, readvertise to only IBGP neighborsB. When learned from External BGP, readvertise to both IBGP and other EBGP neighborsC. When learned from Internal BGP, readvertise to only IBGPD. When learned from Internal BGP, readvertise to both IBGP and EBGP neighborsE. When learned from Internal BGP, readvertise to only EBGPQ.You have multiple routes to the same destination using the default route preference.Which source of routing information will be selected? AA. OSPF InternalB. RIP2007-10-28蚂蚁倾情奉献享是一种美分享是一种美德分享是一种美德享是一种 C. OSPF External D. Internal BGP E. External BGPQ. Which of the following configuration statements must be added to the sample configuration to redistribute RIP prefixes into all OSPF areas? AA. set export rip-2-ospfB. set area 0 export rip-2-ospf set area 10 export rip-2-osp set area 20 export rip-2-ospfC. set area 20 nssa default-lsa default-metric 1D. set area all export rip-2-ospfQ. Which statements are true about service-filters? (choose 3) B,C,E A. A service-filter can only be used on inputB. A service-filter can be used on input, output or bothC. A service-filter cannot match multicast trafficD. A service-filter is a standard stateless firewall-filterE. A service-filter can only be used with interface-style service-setsQ. Which statements are true about the Networks Address Translations (NAT) options that JUNOS supports? (choose 3) A,C,D A. Source DynamicB. Destination DynamicC. Source StaticD. Destination StaticQ. Which statements are true about the Networks Address Translations (NAT) types that JUNOS supports? (choose 4) A,B,C,EA. Source Static 1:1 translationB. Destination Static 1:1 translationC. Source Dynamic many:1 translation (PAT)D. Destination Dynamic 1:1 translationE. Source Dynamic 1:1 translationQ. Which statements below are valid JUNOS stateful-firewall rule actions and action modifiers? (choose 2)A,C A. discard B. log C. syslog D. sampleQ. Which statements are true about the IPSec VPN implementation for protecting transit data on M-Series and J-Series routers? (choose 2) C,DA. Only data integrity is supported with Authentication Header (AH)B. Only data privacy is supported with Encapsulating Security Payload (ESP)C. Both data integrity with Authentication Header (AH) and data privacy with Encapsulating Security Paylpoad (ESP) are supportedD. Only tunnel mode is supportedE. Only transport mode is supportedQ. Which statements are true about Application Layer Gateways (ALG\'s)? (choose 3) A,B,E A. ALG\'s allow the router to interact with protocols at layer 4 and above B. ALG\'s allow the router to inspect the payload of connections C. ALG\'s allow the router to translate protocols D. ALG\'s are required for all connections E. Custom ALG definitions can be configuredQ. Which statements below are valid JUNOS nat rule match types and actions? (choose 3) A,D,F A. from source-addressB. from destination-address-rangeC. from source-prefix-listD. then translated translation-type source dynamicE. then count <counter-name>F. then no-translationQ. Which statements below best describe the role of Class of Service (choose 2) B,D A. CoS is designed to make the network fasterB. CoS provides mechanisms for categorizing trafficC. CoS is designed to reduce congestionD. CoS allows network devices to prioritize traffic based on categoryE. CoS always improves network performance2007-10-28蚂蚁倾情奉献享是一种美分享是一种美德分享是一种美德享是一种Q. Which statements are true for Class of Service traffic classification (choose 3) B,D,EA. Behavior Aggregate (BA) classification is based on examining various fields in the IP headerB. Multifield (MF) classification is based on examining various fields in the IP headerC. Behavior Aggregate (BA) classifiers are most commonly used at the edge of the networkD. Behavior Aggregate (BA) classifiers are most commonly used in the network coreE. Behavior Aggregate (BA) classification is based on examining codepointsQ. The components of scheduling include priority, transmission-rate, buffer-size and congestion avoidance (RED).<br><br>Which statements are true about Scheduling on M-Series and J-Series routers (choose 4) A,B,C,DA. Priority defines the order of which queues will be servicedB. By default all queues are low priorityC. The queue priorities on J-Series routers are<br>a. High<br>b. Medium-high<br>c. Medium-low<br>d. LowD. By default the buffer-size is distributed equally amongst available queuesE. Congestion avoidance with RED by default results in 50% drop when the corresponding queue is 50% full Q. You need to verify that packets are being correctly classified and sent to the appropriate queue on a J-Series router with interface se-3/0/0.<br><br>Which commands or tools could be used to verify this information? (choose 2) A,DA. how interfaces queue se-3/0/0B. show class-of-service interface se-3/0/0C. show interfaces se-3/0/0 queue-statisticsD. show interfaces detail se-3/0/0Q. Which statements are true regarding Multilink Frame Relay (MLFR)? (choose 2) A,D A. FRF.15 is similar to Multilink PPP (MLPPP) and operates end-to-end B. FRF.16 is similar to Multilink PPP (MLPPP) and operates end-to-endC. FRF.15 makes it possible to connect a Customer Premise Equipment (CPE) device with multiple connections to the Provider Edge (PE) device as a single logical connectionD. FRF.16 makes it possible to connect a Customer Premise Equipment (CPE) device with multiple connections to the Provider Edge (PE) device as a single logical connectionQ. The enterprise network you manage is tightening security of all network devices. You are tasked toensure that optimum security of the routers is achieved without interruption to any legitimate protocols or services that are required to run and manage this network.<br><br>Which commands should be run to ensure all services and protocols are included in the router protection filters? (choose 4) A,B,D,F A. Configuration mode show system B. Configuration mode show snmpC. Configuration mode show servicesD. Configuration mode show protocolsE. Configuration mode show firewallF. Operation mode show system connectionsG. Operation mode show system statisticsQ. Which statements are true about the use of next-hop style service sets over interface-style service sets when using IPSec VPNs? BA. Supports securing traffic to remote endpointB. Supports routing protocols directly over IPSecC. Supports multiple remote endpointsD. Supports having multiple local endpoints in the same service-setQ. M-Series and J-Series routers? (choose 2) C,DA. Only data integrity is supported with Authentication Header (AH)B. Only data privacy is supported with Encapsulating Security Payload (ESP)C. Both data integrity with Authentication Header (AH) and data privacy with Encapsulating Security Paylpoad (ESP) are supportedD. Only tunnel mode is supportedQ. Which statements are true about IPSec-over-GRE Tunnels? (choose 2) A,D A. ipsec-over-gre are GRE tunnels that are secured by IPSec B. ipsec-over-gre are IPSec tunnels that are routed over GREC. If the GRE and IPSec endpoints are the same, you should use a next-hop style service-setD. If the GRE and IPSec endpoints are the same, you should use a interface style service-setQ. The IPSec VPN you have just configured is not establishing. To troubleshoot this you have configured the router with traceoptions as below.<br><br>[edit services ipsec-vpn]<br>user@Junos-router# show traceoptions <br>file size 1m files 5;<br>flag ike;<br>[edit services ipsec-vpn]<br><br>Which commands could be used to monitor this? (choose 2) C,F A. show log ipsec-vpn B. show log messages C. show log kmdD. monitor start ipsec-vpn2007-10-28蚂蚁倾情奉献享是一种美分享是一种美德分享是一种美德享是一种 E. monitor start messages F. monitor start kmdQ. Which command can be used to determine whether the SNMP process is running? C A. show process snmp B. show snmp daemonC. show system processesD. show task snmpQ. Which command can be used monitor the temperature of the components in a Juniper Networks enterprise router? CA. show chassis temperatureB. show system temperatureC. show chassis environmentD. show temperatureQ. Which statements are true about multilink-ppp? Which mechanism is best suited? B A. multilink-ppp can only be configured on ISDN interfaces on a J-Series routerB. multilink-ppp allows for the increase in overall throughput by combining the bandwidth of two or more physical linksC. multilink-ppp can only be configured in combination with a valid CRTP configurationD. multilink-ppp requires multiple IP pt-to-pt links over PPP to provide redundancy Q. Which statements are true about Compressed Real-Time Transport Protocol? (choose 2) A,C A. CRTP is intended to reduce serialization delay B. CRTP must be configured with multiple links C. CRTP can be configured with a single link D. CRTP compresses both UDP and TCP headersQ. The routers configuration in the exhibit does not have the router-id configured. Which area will the loopback interface of the router be included in the Router LSA (Type 1)? D A. Area 0.0.0.0 B. Area 0.0.0.20 C. No AreasD. Area 0.0.0.0 and Area 0.0.0.202007-10-28蚂蚁倾情奉献。