Page 1 out of 11. Viewing questions 1-15 out of 166
Question 1
Which of the following architecture is used by mainstream switches?
A.
Bus
B.
Shared memory
C.
Switching matrix
D.
Distributed
E.
Clos architecture
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 2
Which of the following authorization items is not required for risky operations?
A.
Management authorization
B.
Technology authorization
C.
Customer authorization
D.
Administrative authorization
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
Which of the following statements is not included in network security optimization?
A.
Management security
B.
Border security
C.
Access control
D.
Log management
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
In the fault determining and analysis phase of the structured network troubleshooting process, summarizing the fault, maintenance, and change information can obtain a network fault cause list.
A.
TRUE
B.
FALSE
Answer:
B
User Votes:
A
50%
B
50%
Discussions
0/ 1000
Question 5
Which of the following statements regarding the device software upgrade feasibility is true?
A.
To ensure the stable running of network devices, you are advised to upgrade the device software in a timely manner.
B.
Generally, the device software upgrade does not affect the stable network running. Therefore, risk assessment and avoidance are not required before the upgrade.
C.
The upgrade only causes service interruption for a very short time. Therefore, you do not need to confirm with the customer about the upgrade, improving efficiency.
D.
Before performing a major upgrade or complex upgrade operations, you need to conduct commissioning and test the upgrade plan and contingency plan in the simulation environment.
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
Which of the following items on the packing list need to be checked during unpacking and inspection? (Multiple Choice)
A.
Part number
B.
Part model
C.
Number of parts
D.
Project name
Answer:
ABCD
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
Which of the following statements regarding network maintenance are true? (Multiple Choice)
A.
Routine maintenance belongs to the routine work plan.
B.
Routine maintenance belongs to the Improve phase of Plan, Design, Implement, Operate, Improve (PDIOI).
C.
Routine maintenance is driven by events.
D.
Handling of some issues in troubleshooting can be incorporated into routine maintenance.
Answer:
AD
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
Assume that you received a phone call at your office seat. An employee said he/she could not access the Internet on the PC and needed your technical support. Then you ran the ping command on his/her PC and ran the tracert command to check where packet loss occurred. Which of the following troubleshooting methods is used in this process?
A.
Configuration comparison
B.
Bottom-up
C.
Service traffic path check
D.
Top-down
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
Switches run the MSTP protocol by default. Which of the following statements regarding the default status is true?
A.
All switches run in the same region by default.
B.
The STP calculation speed is faster than that when multiple instances are configured.
C.
Due to lack of configuration, all switches switch the running mode to RSTP.
D.
Each switch runs in an independent region.
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
A user reported a failure to receive emails through the email client. Which of the following are possible causes? (Multiple Choice)
A.
The user does not have the required rights.
B.
The email server is faulty.
C.
The link is faulty.
D.
The client settings are incorrect.
Answer:
ABCD
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
Which of the following statements regarding NMS usage are true? (Multiple Choice)
A.
The NMS supports alarm management. For example, the Up/Down change of a port can be immediately reported to the NMS through trap, so that the network administrator can discover and rectify network faults in a timely manner.
B.
The NMS supports performance management. It automatically collects statistics about the CPU usage and memory usage of devices, helping the network administrator analyze network performance bottlenecks.
C.
The NMS supports configuration file management, including automatically backing up, comparing, and restoring the configuration file, allowing the network administrator to configure automatic batch configuration file backup.
D.
Based on user requirements, the NMS can generate reports periodically, providing reference for subsequent network optimization.
Answer:
ABCD
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
Huawei's USG6X00 series firewalls belong to the UTM firewall product and support stateful inspection packet filtering as well as intrusion detection, anti-virus, and URL filtering.
A.
TRUE
B.
FALSE
Answer:
B
User Votes:
A
50%
B
50%
Discussions
0/ 1000
Question 13
If network access fails after a twisted pair is replaced, which of the following methods is the most appropriate for troubleshooting?
A.
Configuration comparison
B.
Top-down
C.
Bottom-up
D.
Replacement
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
Which of the following subsystems are involved in building cabling? (Multiple Choice)
A.
Horizontal subsystem
B.
Access subsystem
C.
Backbone subsystem
D.
Vertical subsystem
E.
Switching subsystem
Answer:
AD
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 15
During the software upgrade, fully prepare and formulate the upgrade solution and rollback solution.