Huawei h35-210-v2-5 practice test

HCIA-Access V2.5 Exam


Question 1

Which of the following are the methods and ideas for locating abnormal XDSL dial-up faults?

  • A. Check the ATM package format of MODEM
  • B. Confirm whether the MODEM configuration is correct
  • C. Query the traffic of the xDSL port to determine whether there is normal business traffic with the terminal
  • D. Confirm whether the gateway can be pinged from the client Product Questions: Version:
Answer:

A, B, C, D

Discussions

Question 2

What is the difference between alarm shielding and alarm suppression?

  • A. When setting the alarm shielding function, the network element will still report the alarm, but the network management will not receive it; when the alarm suppression is set, the network element will no longer report the alarm
  • B. When the alarm shielding function is set, the network element will no longer report the alarm; when the alarm suppression is set, the network element will still report the alarm, but the network manager will not receive it.
  • C. When setting the alarm shielding function, the network element does any processing.
  • D. There is no difference
Answer:

A

Discussions

Question 3

According to whether the UA2000 alarm is confirmed and cleared, what are its alarm states?

  • A. Unconfirmed and uncleared
  • B. Confirmed but not cleared
  • C. Unconfirmed and cleared
  • D. Confirmed and cleared
Answer:

A, B, C, D

Discussions

Question 4

What are the alarm levels of U2000?

  • A. Fatal
  • B. Urgent
  • C. Important
  • D. Secondary
Answer:

B, C, D

Discussions

Question 5

command... What is the correct description of the three points in ./.profile?

  • A. The first point. Means execution, same as sh
  • B. The second point. Connected to the back /, ./ indicates the current directory
  • C. The third point. Connected to the previous /, which means the root directory
  • D. The third point. Before profile, the entire .profile is a file name, which means a hidden file
Answer:

A, B, D

Discussions

Question 6

In the Solaris 10 operating system, when only ordinary users can ftp to the network management
server, which file should be modified so that the root user can also remotely ftp to the server?

  • A. /etc/ftpusers
  • B. /etc/services
  • C. /etc/system
  • D. /etc/defaultrouter
Answer:

A

Discussions

Question 7

Which of the following isql login database commands is correct?

  • A. isql -Usa_password -Ssa -PN2000DBServer
  • B. isql -Usa -Ssa_password -SN2000DBServer
  • C. isql -Usa -PN2000DBServer -Ssa_password
  • D. isql -Usa -Psa_password -SN2000DBServer
Answer:

D

Discussions

Question 8

Which of the following commands is used to close the main server of Sybase System?

  • A. shutdown SYS_MAIN
  • B. shutdown SYS
  • D. Shutdown
Answer:

C

Discussions

Question 9

What factors affect the actual line rate of ADSL business?

  • A. Line length
  • B. Wire diameter
  • C. Interference
  • D. Wiring situation
Answer:

A, B, C, D

Discussions

Question 10

Is the following description correct? The alarm levels of the MA5600T can be divided into five levels:
critical, major, minor, warning, and cleared.

  • A. True
  • B. False
Answer:

A

Discussions
To page 2