ExamGecko
Home Home / Huawei / H35-460

Huawei H35-460 Practice Test - Questions Answers, Page 21

Question list
Search
Search

Which of the passive WDM schemes for CRAN fronthaul is correctly described?

A.
Have OAM capability
A.
Have OAM capability
Answers
B.
No active device is required
B.
No active device is required
Answers
C.
Active fronthaul equipment required
C.
Active fronthaul equipment required
Answers
D.
No OAM capability
D.
No OAM capability
Answers
Suggested answer: C, D

Which of the following is not a BBU veneer?

A.
UPEUe
A.
UPEUe
Answers
B.
URI Ub
B.
URI Ub
Answers
C.
UBBPfw1
C.
UBBPfw1
Answers
D.
CMUH
D.
CMUH
Answers
Suggested answer: B

How many DC power outputs can the DCDU-12B provide?

A.
8
A.
8
Answers
B.
10
B.
10
Answers
C.
6
C.
6
Answers
D.
12
D.
12
Answers
Suggested answer: B

Execute "route add 10.10.10.0 mask 255.255.255.0 192.168.5.1 -p" in the cmd window of the test computer, which one describes the error below?

A.
Commands are generally used in scenarios where the PC has many network cards
A.
Commands are generally used in scenarios where the PC has many network cards
Answers
B.
You can use route print to confirm whether the command is executed successfully
B.
You can use route print to confirm whether the command is executed successfully
Answers
C.
The data at destination address 10.10.10.X will be sent through the gateway 192.168.5.1
C.
The data at destination address 10.10.10.X will be sent through the gateway 192.168.5.1
Answers
D.
This command adds a temporary route
D.
This command adds a temporary route
Answers
Suggested answer: D

In the NSA network test using Probe, it was found that the MAC layer rate of LTE upstream is 20Mbps, but the PDCP layer rate is 0

A.
PDCP layer failure
A.
PDCP layer failure
Answers
B.
The bit error is too high, and the data is heavy
B.
The bit error is too high, and the data is heavy
Answers
C.
LTE data is aggregated into the PDCP layer of NR
C.
LTE data is aggregated into the PDCP layer of NR
Answers
D.
Tool statistical anomalies
D.
Tool statistical anomalies
Answers
Suggested answer: C

Compared with the NSA architecture, the advantage of the SA architecture is that it can better focus on which businesses

A.
mMTC business
A.
mMTC business
Answers
B.
eMBB business
B.
eMBB business
Answers
C.
Network slicing services
C.
Network slicing services
Answers
D.
uRLLC business
D.
uRLLC business
Answers
Suggested answer: A, C, D

For the description of NSA networking, which items are correct?

A.
User data of gNB can be forwarded via eNB
A.
User data of gNB can be forwarded via eNB
Answers
B.
User data for gNBs can be sent directly to the EPC
B.
User data for gNBs can be sent directly to the EPC
Answers
C.
UE signaling can be sent directly to gNB
C.
UE signaling can be sent directly to gNB
Answers
D.
UE signaling can only be forwarded via eNB
D.
UE signaling can only be forwarded via eNB
Answers
Suggested answer: A, B, D

If a CPE Pro device forgets its password, how long can I press the reset button on the near end to perform a factory reset?

A.
8s
A.
8s
Answers
B.
4s
B.
4s
Answers
C.
20s
C.
20s
Answers
D.
12s
D.
12s
Answers
Suggested answer: A

When debugging the NR base station through the near end of the USB flash drive, which of the following conditions will cause the RU indicator of the main control board to be in the "load failed" state?

A.
The data profile loaded by the network element through the USB flash drive last time is consistent with the data profile in the USB flash drive
A.
The data profile loaded by the network element through the USB flash drive last time is consistent with the data profile in the USB flash drive
Answers
B.
The base station recognizes that the base station corresponding to the USB flash drive is not the current base station
B.
The base station recognizes that the base station corresponding to the USB flash drive is not the current base station
Answers
C.
The data in the USB flash drive is not protected by integrity protection and encryption
C.
The data in the USB flash drive is not protected by integrity protection and encryption
Answers
D.
The file format or self-recording in the USB flash drive is illegal
D.
The file format or self-recording in the USB flash drive is illegal
Answers
Suggested answer: C, D

After the new NSA network is turned on, which of the following phenomena can be observed?

A.
eNodeb sends SGNB_ADD_REQ through the X2 interface
A.
eNodeb sends SGNB_ADD_REQ through the X2 interface
Answers
B.
The UE sends RRC_ CONN_RECFG_COMP messages to the NR base station
B.
The UE sends RRC_ CONN_RECFG_COMP messages to the NR base station
Answers
C.
You can observe the RRC_MEAS_RPRT messages reported by UE
C.
You can observe the RRC_MEAS_RPRT messages reported by UE
Answers
D.
The base station can be observed sending RRC_CONN_RECFG message to the UE, carrying the EventB1 cell
D.
The base station can be observed sending RRC_CONN_RECFG message to the UE, carrying the EventB1 cell
Answers
Suggested answer: A, C, D
Total 218 questions
Go to page: of 22