2018 Real Huawei H31-321 Exam Questions Killtest

Slides:



Advertisements
Similar presentations
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Advertisements

Chapter 9: Access Control Lists
University of Calgary – CPSC 441.  Ethernet, defined under IEEE 802.3, is one of today's most widely used data communications standards  It finds its.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
© Tejas Networks India Ltd., 2007, Proprietary Information Rev1.1 Last update 24 Oct 07 DEMO.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 3 Ethernet Technologies/ Ethernet Switching/ TCP/IP Protocol Suite and IP Addressing.
Basic IP Traffic Management with Access Lists
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
“Internetworking” Bridges –Transparent bridges –Source Routing - Transparent Bridges Routers (Network Layer) Brouters
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
CSE331: Introduction to Networks and Security Lecture 7 Fall 2002.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Why create a subnet mask? Tells device which part of an address is the network # including the subnet and which part is the host Filters the node IP address.
Chapter 13 Wired LANs: Ethernet
1 Wide Area Networks Computer Networks. 2 Motivation Connect multiple sites Span geographic distances Cross public right-of-way streets buildings railroads.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
Cisco – Chapter 3 LAN. LAN Teaching Topology physical topology is the actual layout of the wire (media) logical topology defines how the media is accessed.
1 UDP : User Datagram Protocol Computer Network System Sirak Kaewjamnong.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
SONET is used as a WAN. ANSI standard – SONET ITU-T standard – SDH Both are fundamentally similar and compatible.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
Cisco Network Devices Chapter 6 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Identify and explain various Cisco.
1. 2 It is a Physical layer device (Layer 1) It is Dummy Device It works with 0’s and 1’s (Bits) It works with broadcasting It works with shared bandwidth.
Microsoft Windows XP Professional
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
Virtual Local Area Networks (VLANs) Part II
Ethernet Advanced Chapter 5. Release 16/7/2009 Chapter Objectives Explain 10Base-T network Explain 10Base-FL Explain the rule Identify different.
4: DataLink Layer1 Hubs r Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces.
Multi-protocol Label Switching
Network Layer 1. OSI network layer  OSI model layer 3  TCP/IP model Internet layer Application Presentation Session Transport Network Data link Physical.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s

Network Load Balancing Addressing
Network Access and Transmission Methods
Youngstown State University Cisco Regional Academy
COMPUTER NETWORKS CS610 Lecture-15 Hammad Khalid Khan.
Instructor Materials Chapter 7: Access Control Lists
Lecture 3 By Miss Irum Matloob.
Switching and VLANs.
Instructor Materials Chapter 6: VLANs
Networking Devices.
UNM&ABQG Network Topology
Network connectivity to the legacy wired LAN
SUPA/YMCA (Yang Models for Configuration and topology Abstraction)
Chapter 5: Inter-VLAN Routing
Virtual LANs.
The IP addresses are unique. The address space of IPv4 is 2 32 or 4,294,967,296.
Presented by Radha Gummuluri ECE-E 641 Fiber Optic Communications
Ethernet : Framing and Addressing
Chapter 4: Access Control Lists (ACLs)
Huawei HCNA-Storage 3.0 H ENU Questions Killtest
2018 Huawei H Real Questions Killtest
2018 Huawei H Real Questions Killtest
2018 Real CompTIA N Exam Questions Killtest
Routing and Switching Essentials v6.0
CHAPTER 8 Network Management
NTHU CS5421 Cloud Computing
Network Devices Hub Definition:
Physical and Logical Topologies
TCP/IP Protocol Suite: Review
The University of Adelaide, School of Computer Science
LAN Hardware Concepts Module 3 H3065S F.00 [Course Title]
Network connectivity to the legacy wired LAN
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Presentation transcript:

2018 H Questions KillTest

Question 1 If equipment power is configured with 1+1 protection, you can replace the PIU board without cutting off the supply from the DC power distribution unit. A. TRUE B. FALSE Answer: B

Question 2 Which of the following bytes cannot be processed in pass- through mode on an ADM site using OptiX NG-SDH equipment? A. K1 B. K2 C. A1 D. A2 Answer: CD

Question 3 You can change the VC~12 numbering policy by configuring related parameters on the U2000. A. TRUE B. FALSE Answer: B

Question 4 Which of the following about the SSM protocol are true? A. After the SSM protocol is disabled, the clock network can be unidirectional but cannot adopt a ring topology. B. After the standard SSM protocol is enabled, the clock network can be bidirectional but cannot adopt a ring topology. C. After the extended SSM protocol is enabled, the clock network can be bidirectional and adopt a ring topology, which can be intersecting or tangent with other networks. D. The SSM protocol has little to do with clock networks. Answer: AB

Question 5 Two SNCP rings are intersected. Which of the following statements is true about inter-ring service configuration? A. Configure one unidirectional SNCP service pair on each intersecting node. B. Configure two unidirectional SNCP service pairs on each intersecting node. C. Configure four unidirectional SNCP service pairs on each intersecting node. D. Do not configure any SNCP protection group on each intersecting node. Answer: C

Question 6 Latency of store-and-forward equipment is the difference between the time the first bit of a data frame enters the equipment and the time the first bit exits the equipment. A. TRUE B. FALSE Answer: B

Question 7 Which of the following may cause generation of discrete services in an NG-SDH system? A. Trail query conditions are not met. For example, the fiber connections created on the NMS are inconsistent with the actual fiber connections. B. Trail query restrictions exist. For example, among the multiple sources and sinks of a VC~4 service trail, some are outbound optical ports, and the others are non-outbound optical or electrical ports. C. Cross-connection configurations are incomplete or incorrect. D. Outgoing services exist. E. The service trails created in an end-to-end manner is not activated on the NMS. Answer: ABCD

Question 8 On a network where MSP rings and SNCP rings share fiber resources, if Assigned by VC~4 is selected, you need to set holdoff time for SNCP services. A. TRUE B. FALSE Answer: B

Question 9 You need to specify the length of data frames before using a data analyzer to test throughput. What is the length of a standard Ethernet frame? A. 64 bytes B. 128 bytes C bytes D bytes Answer: ABC

Question 10 Which of the following are true about the NE ID of an ASON NE? A. Each NE ID must be unique in an ASON domain. B. The NE ID and IP address of an NE must be in different network segments. C. NE IDs must be set before the ASON feature is enabled. After the NE ID of an NE is configured, the NE will not warm reset. D. NE IDs, NE IDs, and NE IP addresses are independent from each other. E. NE IDs and IP addresses must be in the same format. An NE ID cannot be , , or Answer: ABDE

Thank You