With regard to the three VLANs with different attributes (common, QinQ, and Stacking), the MA5600T uses the default tag transformation rules (that is, tag-transform is set to default) when configuring the service flow. Which one of the following descriptions is incorrect?
Is the following description correct? Version rollback generally includes three steps: 1. Load the original version of the package file; 2. Load the original version database backed up before the upgrade; 3. Reset the system.
Is the following description correct? The key parameters of ODN network are attenuation, insertion loss, and return loss.
In the Solaris environment, which of the following commands (parameters) is used to unconditionally terminate the process?
For GPON lines, MA5600T/MA5680T supports multiple protection switching methods. Which protection technology below MA5600T/MA5680T supports simultaneous protection of backbone fiber and branch fiber?
MA5600T provides various networking protection functions. Which of the following protection features is usually used for upstream port protection?
The international professional organization responsible for allocating IP addresses has divided several network segments as private network segments, which can be freely distributed and used by people on private networks. Which of the following is not a network segment of private addresses?
What technology does the GPON system use to provide the original CATV service?
In the UA5000 chassis of the high-density PVM main control, which command needs to be used when configuring the chassis connection?
How many channels of ADSL2+&POTS access services are provided by the MA5600T ADSL2+&POTS integrated service board H80BCAME?
How to confirm the ip address of the Sybase database server during the installation of the network management system?
Which of the following belongs to the management protocol between the OLT and MXU in the GPON network?
When the UA5000 is configured with the H.248 protocol to connect to the softswitch, which of the following parameters must be consistent at both ends?
According to the IEEE 802.1Q standard, where is the VLAN identification field in the Ethernet frame?
Which of the following symbols are used to represent all terminals in the H.248 protocol?
Among the access technologies of the access network, which of the following access methods can provide the largest access bandwidth?
What is the allocation method of terminal identifiers stipulated in the H248 protocol?
Which of the following parameters are required to set up a network management workstation?
Is the following description correct? Set the TCONT type bound to the IPTV service of a certain ONT to Type2 and a bandwidth of 20M, then the maximum IPTV service cannot exceed 20M.
MA5600 system comes with 4 default ADSL line templates, which of the following templates are provided when the system leaves the factory?
In the H.248 protocol, the terminal can be programmed to detect events. Once these events are detected, the MG will send a report to the MGC or the MG will take corresponding actions.
Is the following description correct? MA5680T supports the function of traffic shaping on specific service-ports.
Regarding the ADSL rate limit in the UA5000, which of the following statements is incorrect?
Is the following description correct? The ADSL port can only allow further operations on the port after unblocking the port.
Regarding the MA5600T/MA5680T Ethernet access service board, which of the following statements is correct?
MA5600T/MA5680T GE/FE optical interface board H802OPGD provides Ethernet optical access function. How many GE/FE P2P accesses can be supported at most?
Is the following description correct? MA5612 supports RF (Radio Frequency) over PON service access.
MA5600 supports ADSL2+, which of the following descriptions about ADSL2+ is incorrect?
Is the following description correct? The goal of ATM, that is, the biggest feature of ATM, is to achieve the best network resource utilization for any form of business distribution. To achieve this goal, statistical multiplexing of network resources is necessary.
Is the following description correct? The access network upgrade loading file transfer can use FTP, TFTP, or SFTP, and FTP is recommended.