H3CSE-ROUTING & SWITCHING Exam GB0-391-ENU Questions V9.02 H3CSE-Routing & Switching Topics - Constructing Secure optimized WANs v2.0 (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well 1. Which of the following statements about the access network is correct is _____ A. access into generally refers to the connection between the user and the network operator of the network close to the user central office B. Compared with backbone network, access network is often the bottleneck of network transmission speed C. access network typically includes a user transmission system, terminal multiplexers or network, D.The access network can also be Ethernet Answer: ABCD 2.Among the control messages defined by the MPCP protocol, the one sent by the OLT is ______ .( Choose one or more ) A.GATE B.Report C.Register_Req D.Register E.Register_Ack Answer: AD Explanation: 3.The OLT sends out a gate message 4.ONU returns report message 5.ONU issued register_req cancellation message 6.OLT issue register cancellation message 5 ONU issuing register_ACK message 7.The following statements about VLAN planning in the EPCNI network are correct: _____ ( choose one or more ) A.PSPV manner the same user for all services use the same one VLAN to be labeled, its implementation can not be guaranteed quality of service. B.In PUPV mode, all users in the cell share the same business vlan id . C.PUPSPV mode can accurately identify users and services, and each user’s business has a corresponding vlan id identification. D. The deployment of PUPSPV mode requires equipment to support QinQ technology. Answer: CD Explanation: PSPV the embodiment OLT transparent transmission vlan , only the operations performed vlan divided.No division of users. (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well 8. Compared with IPsec VPN , which of the following advantages does SSL VPN have ? ( Choose one or more ) A. No client B. -free installation, maintenance-free client C. speed of fast D. High -fine-grained access control Answer: BD Explanation: SSL can install and maintain the client directly using the browser, and can traverse NAT based on the TCP level 9.Among the packets encapsulated by the GRE protocol, the payload protocol is the IPX protocol, and the bearer protocol is the IP protocol.The encapsulation sequence of the packet from the link layer to the payload data is the link layer ____GRE____ payload data. A.lP , IPX B.IPX , IP C.IP , IP D.IPX , IPX Answer: A Explanation: Link Layer --- bearer protocol ---- encapsulation protocol ---- Payload --- packets 10. Use the PC as the client and use the client LAC mode to establish an L2TP tunnel through the iNode and LNS .The user logs in successfully but cannot communicate normally .The possible cause of this problem is ____ .( Choose one or more ) A. use username password error B.Tunnel interface verification fails C. far processing system to LNS public network transmission unstable D.LNS to LAC authentication fails Answ er: C 11.Which of the following statements about PKI workflow is correct is ____ . A. permit book application made by the entity B. solid body status reviewed by the CA to complete C. Certificate book by the RA issued D. solid body needs to revoke the certificate CA application Answer: AD (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well Explanation: The entity submits an application, the RA conducts the review, the CA issues, and the application to the CA is cancelled . 12.Which of the following statements about IKE is correct is ____ .( Choose one or more ) A.The first phase of IKE exchange mode has main mode and quick mode B.IKE SA is generated when the second phase of IKE is completed C.The exchange of keys in both IKE modes requires authentication D.IKE uses an asymmetric key algorithm when exchanging keys Answer: CD Explanation: KE first stage: main mode and aggressive mode, generate IKE SA second stage: fast mode, generate IPSEC SA 13.The following description does not belong to SSL handshake protocol layer function are ____ . A. Negative responsible for the establishment, maintenance SSL session B. insurance certificate, reliable data transmission C. isobutyl the normally turned off SSL connection D. verify the integrity of the card data Answer: BD 14. On what device in the MPLS network does the MPLS forwarding medium voltage label ( PUSH ) operation occur ? A. The packet enters the MPLS network at the LER on device B.On all LSR devices in the middle of the MPLS network C. The packet leaves the MPLS network address LER on device D.On all devices of the MPLS network Answer: A Explanation: push-swap-pop 15.The wrong description of the relationship between RT and RD is ____ . A. with a VPN to RT value must RD same value B.the RD value of their respective VPN of RT attributes Import Target property or Export Target a property list C. same on a device different VPN of RD value and the RT attribute values can not be configured to be the same (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well Answer: ABC 16. Which of the following information about the private network route learned from the remote end through the MP-BGP protocol will be recorded by the PE ? A.RT Import Target attribute of the private network route B. The private network label of the private network route C.RD value of the private network route Answer: BC 17. The changes of MP-BGP protocol relative to BGP protocol include A. The new increase MP REACH NLRI attribute B. The new increase MP UNREACH NLRI attribute C. The new increase Extended Communities attribute D. new growth VPNv4 address family Answer: ABCD 18.What is correct about DOS attacks is ____ . A.DOS attacks are aimed at reducing the ability of the attacked system to provide services B. on to DOS attacks in the TCP FLOOD attack, you can use TCP proxy mechanism to defense C. for at DOS attack in the FTP FLOOD attack can be taken to limit the number of connections per second to defense D. on to DOS attacks can be controlled by configure access lists on a network device to defense Answer: ABC 19.Which of the following statements about symmetric encryption algorithms is correct is ____ . A. for said encryption algorithm efficiency higher B. of said encryption algorithm is suitable for a large amount of data transfer environment C. for encryption algorithm called AES , 3DES , DES , etc. D. to safety, said encryption algorithm depends entirely on the security of the key itself Answer : ABCD Explanation: Symmetrical is fast and not as safe as asymmetrical (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well 20. Which of the following are measurement standards for voice quality ? A.MOS B.PESQ C.PQSM D.PSQM Answer: ABD 21. A company PBX via a T1 connection line to the telephone network operators, due to expansion of company size, needs to be able to meet the concurrent 50 -way voice calls, you need to re-apply for ____ root T1 line ? ( Fill in Arabic numerals ) A.2 Answer: A Explanation: T1 is 1.5M , 50 voice channels need 50*56K=2800K bandwidth 22. In a VoIP network where calls are made through a gatekeeper , what will happen when the gatekeeper cannot determine the location information of the called terminal within its jurisdiction ? A. The calling party replies to the gatekeeper rejection ( GRJ ) message B. Reply to the caller with a location rejection ( LRJ ) message C. Reply to the caller with a permission rejection ( ARJ ) message D. to the answers are right Answer: D 23. During the SIP UA registration process, a response message with a status code of 401 was received, stating that ____? A.UA has been registered on the registration server normally B. Table showing UA sends a request message packet server sets the field do not know, but it has been ignored server, UA still successfully registered C. Table shows the server needs UA transmit authentication information, UA after receiving the response, it would Laid own authentication information registration request sent by a second server to register D. Table shows UA request message sent by the server contains the fields do not know, registration failed Answer: C 24.The following commands are configured on the S3610 switch: qos map-table dotlp-ip (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well import 1 export4 import 2 export 5 interface Ethernet1/0/8 port link-mode bridge port link-tpe trunk port trunk permit vlan 1 4 qos trus t dotlp interface Ethernet1/0/9 port link-mode bridge port link-tpe trunk port trunk permit vlan 1 4 qos gts an cir 65000 cbs 2000000 Then when the traffic is 40Mbps , the packets with the vlan id of 4 and the 802.1p priority are 1 , and the packets with the traffic of 40Mbps with the vlan id of 4 and the 802.1p priority of 2 enter at the same time from port E 1/0/8 , When forwarding from port E1/0/9 , which of the following statements is correct is ____ .( Choose one or more ) A.80Mbps packets are forwarded normally B. Packet traffic shaping is 65Mbps for forwarding C. Packets with 802.1p priority 1 have packet loss on the outgoing port E1/0/9 D. All packets with 802.1p priority 1 are stored out of port E1/0/9 and forwarded E. Packets with 802.1p priority 2 have packet loss on outbound port E1/0/9 F. All packets with 802.1p priority 2 are forwarded on the outgoing port E1/0/9 G. portions partial misconfigured Answer: BCF Explanation: Priority 2 has high priority and priority processing 25. Use the command on the MSR router: dis qos wfq interface GigabitEthernet 0/1 Get the following information: Interface: GigabitEthernet0/1 Output queue: ( Urgent queuing: Size/Length/Discards ) 0/100/0 Output queue: ( Protocol|queuing: Size/Length/Discards ) 0/500/0 Output queue: ( Weighted Fair queuing: Size/Length/Discarcds ) 1023/1024/52719 Hashed b DSCP Hashed queues 1/2/64 ( Active/Max active/Total ) Then the correct one in the following statement is ____ . A. end port using the WFQ queues, the weight type DSCP B. end port using the WFQ queues, the weight of type IP priority C. When the number of queues is active before 2 D. calendar history activated off the maximum number of queues is 2 (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well E. team column a maximum length of 1024 , the current data hold chamber, and packet loss Answer: ADE 26. In the MSR router configuration command is as follows: acl number 2001 rule o permit source 19 2.168.2.0 0.0.0.255 acl number 2002 rule o permit source 192.168.3.0 0.0.0.255 acl number 2003 rule o permit source 192.168.0.0 0.0.0.255 # traffic classifier 2 operator or if-match acl 2001 if-match classifier 1 traffic classifier 1 operator and if-match acl 2002 if-match acl 2003 # traffic behavior 2 filter deny # qos polic 2 classifier 2 behavior 2 # interface GigabitEthernet0/1 port link-mode route ip address 192.168.1.1 255.255.255.0 qos appl polic 2 0utbound When the source address are 192.168.2.2.192.168.3.2.192.168.0.2 packets from the port G0 / 1 forwarding outwardly, the following statement is correct ____ . A. Packets with the source address of 192.168.2.2 are forwarded normally B. Packets with source address 192.168.3.2 are forwarded normally C. Packets with the source address of 192.168.0.2 are forwarded normally D. three message by the flow are blocked Answer: BC Explanation: The and of ACL means that the IP must meet 2 network segments at the same time , it is impossible 27.The configuration commands on the MSR router are as follows : (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well acl number 2000 rul e o permit source 192.168.0.0 0.0.0.255 acl number 2002 rule o permit source 192.168.2.0 0.0.0.255 # traffic classifier 2 0perator and if-match acl 2002 traffic classifier l operator and if-match acl 2000 ## interface GigbitEthernet0/1 port link-mode route duplex full speed 10 ip address 192.168.1.1 255.255.255.0 qos reserved-bandwidth pct 90 qos appl polic test outbound When the traffic rates of packets with source addresses of 192.168.0.2 , 192.168.2.2 , and 192.168.3.2 are 4Mbps , 4Mbps , 5Mbps , and no other background traffic is forwarded from port G0/l . The incorrect statement under the team is ____ . A. The forwarding rate of packets with the source address of 192.168.0.2 is about 4Mbps B. The forwarding rate of packets with the source address of 192.168.0.2 is about 3Mbps C. The forwarding rate of packets with the source address of 192.168.0.2 is about 2.7Mbps D. The forwarding rate of packets with the source address of 192.168.2.2 is about 4Mbps E. The forwarding rate of packets with the source address of 192.168.2.2 is about 3Mbps F. The forwarding rate of packets with the source address of 192.168.2.2 is about 2.7Mbps Answer: ABDE Explanation: Bandwidth 9M , 9*0.3=2.7M 28. Based on SOA network architecture to enterprise IT systems into which of the following levels ? ( Select one or more ) A. mesh network layer B. will then layer C. should application layer (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well D. base infrastructure layer Answer: CD 29. Based on SOA network architecture to enterprise IT systems into which of the following levels ? ( Select one or more ) A. shall by layer B. business service layer C. mesh network layer D. service service layer Answer: A D 30. Based on SOA network architecture to enterprise IT systems into which of the following levels ? ( Select one or more ) A. the number of data layers B. service service layer C. business service layer D.lP network layer Answer: B 31.Which of the following statements about SOA and IToIP is correct is ____ . A.SOA solutions to the requirements of IT infrastructure integration, unified web- based technology to build IT infrastructure platform. B.SOA is based on the network, eliminates the information gap caused by heterogeneous systems, integrates various services such as storage, security, and multimedia, and realizes the componentization and resourceization of IT infrastructure. C.The IToIP solution embodies the core idea of SOA . D.IToIP allows flexible, fast and efficient construction of enterprise intelligent applications, and can quickly adapt to changes in enterprise business processes. Answer: CD 32.The following information about IToIP The mistake is ____ . A.IToIP requires an IT system to be constructed with an IP network as the infrastructure . B. various kinds of IT resources can easily share and use standard lP infrastructure, to achieve further integration of various technologies and applications of communications, computing, storage, networking and so on. C.IToIP closely connects applications and infrastructure, greatly improving the operating efficiency of IT systems. (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well D. based on IToIP built IT system users can create a standard, compatibility, security, intelligent and manageable IT environments. Answer: C 33.xz company requires to build its network based on modular enterprise network architecture.Company Z has 1 R&D base in Shenzhen and Xi'an , and an office building in Beijing and Shanghai ; it has offices with more than 50 people in 23 capital cities ; it has small offices with no more than 8 people in 200 small and medium-sized cities .There are usually more than 200 market and technical personnel on business trips at any given time .Company Z strictly prohibits employees from using the company network to visit websites that are not related to work.According to these circumstances, the network module that Z company should have is ____ . A. Large type branch network B. far away / distributed office network C.Internet access D. dedicated line / packet switched access Answer: CD 34.xz company requires to build its network based on modular enterprise network architecture. Z company in Shenzhen and Xi'an with 1 R & D base, with an office in Beijing and Shanghai ; at 23 with more than capital cities 50 person office ; the 200 has no more than smaller cities 8 people in a small office j There are usually more than 200 market and technical personnel on business trips at any given time .Due to environmental and cost issues, some offices cannot access the headquarters through dedicated lines or packet-switched wide area network connections.According to these circumstances, the network module that Z company should have is ____ . A. Large type branch network B. dedicated line / packet switched access C. far away / distributed office network D.VPN access into Answer: BD 35.XZ company requires to build its network based on the modular enterprise network architecture. Z company in Shenzhen and Xi'an each 1 R & D base ; save Beijing and Shanghai have an office building ; save 23 provincial capital cities with more than 50 people in the office ; the 200 has no more than smaller cities 8 small office person ; At any given time, there are usually more than 200 marketing and technical personnel on business trips, and some of them are often located in areas lacking Internet access and can only dial in to the headquarters through the telephone network.Due to environmental and cost issues, some offices cannot access the headquarters through (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well dedicated lines or packet-switched wide area network connections.According to these circumstances, the network module that Z company should have is _____ . A. Dial Number Access B. An all-authentication C.VPN access D. large type branch network Answer: AC 36. The advantages of modular network architecture include ____ .( Choose one or more ) A. taken on behalf of the traditional hierarchical network model, to facilitate planning and deploying the network. B. allowed to share data, resources and capacity among many different application functions or applications, participate in business processes. C. Yun Xu dynamically invoked through open interfaces IT resources to achieve the standard, compatibility, security, intelligent and manageable IT environments. D. for each module can be separately planning and deployment, network functions can be added or removed, and conducive to building a complex network module by way of additions and deletions. Answer: D 37.The following functions of the convergence layer are ____ .( Choose one or more ) A. owns a large number of interfaces, and for the final connected user computer B. access into the security control C. High -speed packet-switched D. complex routing strategies complicated Answer: D 38.The following belong to the core layer function is ____ .( Choose one or more ) A. owns a large number of interfaces, and for the final connected user computer. B. access into the security control C. High -speed packet-switched D. will be the routing policy Answer: CD 39.The following are functions of the access layer ____ .( Choose one or more ) A. owns a large number of interfaces, and for the final connected user computer B. access into the security control C. High -speed packet-switched (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well D. complex routing strategies complicated Answer: AB 40. The advantages of the hierarchical network model include ___ .( Choose one or more ) A. by strong network scalability B. provide high network throughput C. drop low-end delay D. will be to maintain the network of Answer: AD 41.Among the broadband access transmission media, the highest achievable transmission rate is ____ . A. same coaxial cable B. Copper quality UTP C. no radio waves D. optical fiber E. electric power line Answer: D 42.Among the following broadband access transmission media, the ones that are more suitable for covering remote areas without traditional communication lines include A. same coaxial cable B. Copper quality UTP C. no radio waves D. optical fiber E. electric power line Answer: CE 43. Among the following fiber access methods, the highest degree of fiberization is A.FTTC B.FTTH C.FTTB D.FTTA Answer: B Explanation: FTTH fiber to the home (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well 44.The following options belong to the co- side equipment is ____ . A. access into the switch B. access the server C.cable modem D.DSLAM E. machine top box Answer: ABD 45. The CPE in the following options is ____ . A. access into the switch B. access the server C. Wide band router / modem D.DSLAM E. machine top box F.cable mode m Answer: CEF 46. Which of the following PPPoE messages are sent in broadcast form ? A.PADI ( PPPoE Active Discover Initiation ) B.PADO ( PPPoE Active Discover Offer ) C.PADR ( PPPoE Active Discover Request ) D.PADS ( PPPoE Active Discover Session-Confirmation ) E.PADT ( PPPoE Active Discover Terminate ) A nswer: A 47. Which of the following PPPoE packets may contain valid PPP Session-ID information ? A.PADI ( PPPoE Active Discover Initiation ) B.PADO ( PPPoE Active Discover Offer ) C.PADR ( PPPoE-Active Discover Request ) D.PADS ( PFoPoE Active Discover Session-Confirmation ) E.PADT ( PPPoE Active Discover Ter minate ) Answer: DE 48. In the PPPoE negotiation process, which of the following PPPoE messages must contain Service-Name information ? A.PADI ( PPPoE Active Discover Initiation ) B.PADO ( PPPoE Active Discover Offer ) (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well C.PADR ( PPPoE Active Discover Request ) D.PADT ( PPPoE Active Discover Terminate ) Answer: ABC Explanation: PP POE initially broadcasts and sends a message carrying the service name it needs , and then the server responds. 49. In the PPPoE the PPP Session price segment, PPPoE Client and PPPoE server Ethernet data frames exchanged between an object MAC address may be ____ . A. widely broadcast MAC address B. Group multicast MAC address C. The MAC address of the PPPoE client D. The MAC address of the PPPoE server Answer: CD 50. Please order under PPPoE Client complementary set the correct parameters : [HG] dialer-rule 1 ip permit [HG] interface dialer 2 [HG-Dialer1] dialer user userl [HG-Dialer1] dialer-group____1____ [HG-Dialer1] dialer bundle ____V___ [HG-Dialer1] ip address ppp-negotiate [HG-Dialer1] ppp pap local-user user1 password simple pass1 [HG] interface ethernet 0/0 [HG-Ethernet0/0] pppoe-client dial-bundle-number 10 A ..1 , 10 Answer: A 51. In the Ethernet access application, the correct statement about the deployment of the access point AN and the aggregation equipment AGG at the edge of the operator's access network is ____ . A.the AN taken when a switcher, three switches can team with respect to the end- user access to a higher density to achieve B.When AN adopts a Layer 2 switch, it needs to support and deploy complex Layer 2 isolation and security features on AN and AGG C.When AN adopts a three-layer switch, it is more helpful to control the scope of the broadcast domain than a two-layer switch D.When AN uses a three-layer switch, the maximum number of user terminals that an AGG device can connect to will no longer be limited by the number of its own MAC address table entries (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well Answer: BCD 52. In PPPoE applications, the Ethernet MAC address of the access end is determined in the _____ phase of PPPoE .( Please fill in English ) A.Discovery Answer: A Explanation: discovery phase 53. Ethernet 1000BASE-T cable uses a standard _____ most large transmission distance is ______ . A.2 pairs of Category 5 UTP twisted pair, 100m B. multi- mode fiber, 2000m C.4 pairs of Category 3 UTP twisted pair, 100m D. single -mode optical fiber, 5000m E.4 pairs of Category 5 UTP twisted pair, 100m F.2 pairs of STP twisted pair, 25m Answer: E 54. The cable used in the Ethernet 1000BASE-LX standard is _______ The maximum transmission distance is ________ . A.2 pairs of Category 5 UTP twisted pair, 100m B. multi- mode fiber, 550m C.4 pairs of Category 3 UTP twisted pair, 100m D. single -mode optical fiber, 5000m E.4 pairs of Category 5 UTP twisted pair, 100m F.2 pairs of STP twisted pair, 25m Answer: D 55. In a typical PPPoE network, both PPPoE Server and PPPoE Client are MSR routers.If you want PPPoE to work in permanent online mode, which of the following configurations are required ? ( Choose one or more ) . A.the PPPoE Serve, R & lt on the configuration: [the RTA-virtual- Templatel] PPPoE -client-Number Dial-the bundle.1 B. Configure on PPPoE Client : [HG-Dialer l] pppoe-client dial-bundle-number l C. Configure on PPPoE Client : [HG-Ethernet0/0] pppoe-client dial-bundle-number 1 D. Configure on PPPoE-Server : [RTA-Virtual-Templatel] pppoe- client dial -bundle- number l idle-timeout 65535 E. Configure on PPPoE Server : [RTA- EthernetO/O] pppoe-client dial-bundle-number (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well 1 F. Configure on PPPoE Client : [HG-Dialerl] pppoe-client dial-bundle-number l idle -timeout O Answer: C 56. In a typical PPPoE networking, PPPoE Server and PPPoE Client are for the MSR router, if you want PPPoE session idle 3 minutes after the automatic disconnection, which requires the following configuration ( choose the one or more ) . A. Configure on PPPoE Server : [RTA-Virtual--Template1] pppoe-client dial-bundle- number l idle -timeout 180 B. Configure on PPPoE Client : [HG-Dialerl] pppoe-client dial-bundle-number l idle- timeout 3 C. Configure on PPPoE-Client : [HG-Dialerl] pppoe -client dial-bundle-number l idle- timeout 3 D. Configure on PPPoE-Server : [RTA-Virttual-Template1] pppoe-client dial-bundle- number l idle-timeout 3 E. Configure on PPPoE Server : [RTA-Ethernet0/0] pppoe-client dial-bundle-number l idle -timeout 180 F. Configure on PPPoE Client : [HG-Ethernet 0/0]pppoe-client dial-bundle-number l idle-timeout 180 Answer: F 57. In the EPON system, the port that the ONU device connects to the user is A.OLT B.ONU C.NNI D.UNI Answer: D Explanation: Network side interface NNI , user side interface UNI 58.EPON ranging and delay compensation technology is the key to upstream channel multiplexing, which is mainly realized through the _____ process defined by MPCP .( Choose one or more ) A.Discovery Processing B.Regis tration Processing C.Report Processing D.Gate Processing Answer: AD (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well 59. There are a large number of two-way video and voice communication needs between branches and headquarters of a company, if you want to choose a broadband access to connect branch offices and headquarters, the following options are the most ideal of a _____ . A.APON/BOPN B.ADSL C.EPON Answer: C Explanation: EPON has the same upstream and downstream bandwidth. 60.Among the control messages defined by the MPCP protocol, the one sent by the ONU is _____ .( Choose one or more ) A .The GATE B.Report C.Register_Req D.Register E.Register Ack Answer: BCE Explanation: ONU message: report register-req register-ack 61. During the registration of the ONU , the MPCP control message sent through the broadcast channel includes _____ .( Choose one or more ) A. P through GATE B.Report C.Register_Req D.Register E.Register Ack F. hair now GATE Answer : BCDF Explanation: broadcast: 62. hair now gate 63.report 64.register-req (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well 65.register Single sowing 66. P through gate 67.register-ack 68. During the ONU registration process, the MPCP control message sent through the unicast channel includes _____ .( Choose one or more ) A. P through GATE B.Report C.Register_Req D.Register E.Register_Ack F. hair now GATE Answer: AE 69. In the ONU registration process, comprising L the LID ( the Logical Link ID , Logical Link Flags ) control message comprises information ____ .( Choose one or more ) A. P through GATE B.Report C.Register_Req D.Register E.Register Ack F. hair now GATE Answer: D 70. In FIG illustrated EPON networking, the OLT to the network all the ONU ( the ONU1 to ONUn ) to transmit data, the following statements is correct is ____ .( Choose one or more ) A. Line Road 0 have all the ONU data B. Line Road 1 on which all the ONU data C. wire passage 2 is only to ONU2 data D. Line Road 0 ~ n- downlink data is the same Answer: ABD 71. When the link type of the ONU port is Access , its processing method for the upstream message is ____ . (Newly) H3C GB0-391-ENU Practice Test - Effective Tip to Prepare Well A. only allowed without belt tag packets through, and packets add the default VLAN 's tag B. Only the packets with the default VLAN tag are allowed to pass and go to the tag C. for without receipt of the Tag message, add the default VLAN tag , to receive with tag packets forwarded directly D. only allowed with a tag messages by Answer: A 72. When the link type of the ONU port is Access , its processing method for downstream messages is ____ . A. Only allow packets without tags to pass, and add the default VLAN tag to the packets B. Only the packets with the default VLAN tag are allowed to pass and go to the tag C. for without receipt of the Tag message, add the default VLAN Tag , to receive with Tag packets forwarded directly D. Only allow tagged messages to pass Answer: B 73. When the link type of the ONU port is Trunk , its processing method for upstream packets is _____ . A. only allowed without Tag packets to pass through, and the packets add the default VLAN of Tag B. Only allow the packets with the default LAN Tag to pass and go to the tag C. for without receipt of the Tag message, add the default VLAN Tag ; for received with Tag packets forwarded directly D. Only allow tagged messages to pass Answer: C 74. When the link type of the ONU port is Trunk , its processing method for downstream messages is _____ . A. only allowed without Tag packets to pass through, and the packets add the default VLAN of Tag B. Only allow the packets with the default VLAN tag to pass and remove the tag C. for without receipt of the Tag message, add the default VLAN Tag ; for received with Tag packets forwarded directly D. Only allow tagged messages to pass Answer: D 75. In EPON applications, if the home gateway or switch on the user side is provided