【多选题】
【多选题】下面哪几种切换中,需要核心网参与( )。
A. eNodeB间S1口切换
B. 跨MME的切换
C. eNodeB间X2口切换
D. eNodeB站内切换
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
ABC
解析
暂无解析
相关试题
【多选题】
【多选题】VOLTE语音和传统语音业务下面的说明正确的是( )
A. VOTE语音业务和其他业务共享信道资源,提高了系统容量。
B. 相对传统的IP电话volte增加了控制机制从而保证了语音的质量
C. 传统IP语音如果用LTE承载一样可以控制其QOS提高语音质量
D. VOLTE是一种IP电话。
【多选题】
【多选题】VoLTE 用户注册:VoLTE 用户在体验高质量通话之前,必须先进行 VoLTE 的注册流程,从无线角度来看,注册分为两个步骤( )
A. LTE 无线注册
B. IMS 注册
C. SRVCC 注册
D. MME 注册
【多选题】
【多选题】在NB-IoT中,在核心侧可以统计的Attach指标有( )。
A. Attach失败次数
B. Attach成功率
C. Attach成功次数
D. Attach请求次数
【多选题】
【多选题】SR可以基于如下哪种PUCCH格式单独发送?( )
A. PUCCHformat2
B. PUCCHformat3
C. PUCCHformat1
D. PUCCHformat0
【多选题】
【多选题】在3GPP Rel-15的第一版本所定义的2种频率范围中,工作频段区间在24GHz~52.6GHz时支持的子载波间隔是( )。
A. 60KHz
B. 120KHz
C. 30KHz
D. 15KHz
【多选题】
【多选题】从一个SS/PBCHblock,UE至少可以获取如下哪些信息?( )
A. radioframe number
B. Periodicityof SS burst set
C. slot indexin a radio frame
D. OFDMsymbol index
【多选题】
【多选题】合路器的作用是:( )。
A. 调整电路中信号的大小
B. 用来将不同系统的发射信号互不干扰地合成一路输出
C. 改善阻抗匹配
D. 也可将在同一路中的接收信号互不干扰地分配给各个系统端口
【多选题】
【多选题】《中国电信移动通信网络运行维护规程》规定维护生产操作职责包括数据维护与制作,数据制作与维护,软件版本验证及升级,网络运营分析,服务支撑,网络优化和( )
A. 工程随工及验收
B. 网络故障监控处理
C. 重大活动网络保障
D. 日常维护作业
【多选题】
【多选题】载波聚合下,有关CA UE的切换流程描述正确的有( )。
A. 若支持切换时的SCell配置,在切换时将sCellToReleaseLis信元连同CandidateCellInfoList信元一起发送给目标eNodeB
B. PCell变更导致的切换流程与移动性管理中的切换流程无差异
C. SCell删除时,需要下发RRC Connection Reconfiguration(sCellToReleaseList)消息进行切换
D. SCell添加时,需要下发RRC Connection Reconfiguration(sCellToAddModList)消息进行切换
【多选题】
【多选题】关于5G网络结构的说法正确的是( )。
A. 逻辑功能模块化设计,实现灵活的网络切片
B. 分为核心网5GC与无线接入网NG-RAN两部分
C. 网络基于NFV,SDN技术,实现逻辑功能和硬件的解耦,控制面与用户面的绝对分离
D. 采用基于服务的网络架构
【多选题】
【多选题】PUCCH支持多种格式,以下哪几种格式支持4~14个OFDM符号?( )
A. Format 0
B. Format 4
C. Format 2
D. Format 1
E. Format 3
【多选题】
【多选题】下面关于BWP的描述正确的是?( ? ?)
A. 在某一个时刻,最多只能有一个激活的DLBWP和UL BWP
B. BWP可以支持更低的UE带宽能力
C. BWP的灵活调度可以大大降低功耗
D. BWP可以支持不同的numerology
【多选题】
【多选题】关于RSSI说法正确的是( )
A. 一般前向Rx(手机接收功率)用作覆盖的判断依据,反向RSSI(基站接收功率)通常作为判断系统干扰的依据
B. RSSI接收信号的强度指示,是在反向通道基带接收滤波器之后进行的
C. 新开局用户很少,空载下RSSI电平一般小于-105dBm,有多个业务时RSSI平均值一般不会超过-95dBm
D. 在空载下看RSSI的平均值是判断干扰的最主要手段,也可参考FER上参考判断是否有干扰存在
【多选题】
【多选题】下列关于IPv6描述正确的是( )。
A. 当一个IPv6报文有 多个扩展头部时,扩展头部必须有序地出 现
B. IPv6的地址长度为128bits
C. IPv6的地址长度为64bits
D. 当一个IPv6报文有多个扩展头部时,扩展头部可以随机出现
【多选题】
【多选题】以下描述 哪些是正确的?( )
A. 馈线下铁塔前 1 米处要接地
B. 室外天馈线接地可以接到室内地排上
C. 移动基站室内一般采用联合接地
D. 馈线入馈线窗之前要接地。
推荐试题
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first