11.11 Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

H35-211_V2.5 HCIP-Access V2.5 Questions and Answers

Questions 4

(Single choice) The following statement about SSH connection is incorrect:

Options:

A.

SSH can be applied to secure remote login and encrypted file transfers over remote encrypted connections

B.

The SSH protocol encrypts all transmitted data, effectively preventing information leakage during remote management

C.

From a client perspective, SSH provides two levels of security authentication

D.

The SSH protocol works at the network layer

Buy Now
Questions 5

Which one of the following protection schemes can provide OLT-level protection?

Options:

A.

Type B dual-homing

B.

Ethernet port protection group

C.

LACP

D.

Type B single-homing

Buy Now
Questions 6

(Multi-select) In U2000, adding a line template to map user traffic flows to GEM Ports supports which mapping modes?

Options:

A.

MAC

B.

PORT

C.

VLAN

D.

802.1p

Buy Now
Questions 7

In the NGN system, the ( ) adopts the packet technology to provide a unified integrated transmission platform with high reliability, QoS guarantee, and large capacity.

Options:

A.

Network control layer

B.

Core switching layer

C.

Service management layer

D.

Edge access layer

Buy Now
Questions 8

In the GPON system, Huawei recommends that optical splitting levels do not exceed 2. Which of the following networking is incorrect?

Options:

A.

Level-1 optical splitting 1:2, Level-2 optical splitting 1:16

B.

Level-1 optical splitting 1:16, Level-2 optical splitting 1:16

C.

Level-1 optical splitting 1:8, Level-2 optical splitting 1:8

D.

Level-1 optical splitting 1:2, Level-2 optical splitting 1:8

Buy Now
Questions 9

What can cause erratic display in IPTV programs?

Options:

A.

The receive or transmit optical power of the device is at a critical value.

B.

Some key frames are lost during program compression.

C.

A rate limit is configured on the device.

D.

Some key frames are lost during line transmission.

Buy Now
Questions 10

Different DBA need to be configured for different services. Drag the DBA to corresponding services. (Score only when all the answers are correct.)

H35-211_V2.5 Question 10

Options:

Buy Now
Questions 11

The DBA scheduling of the GPON system is only for the upstream traffic, and the downstream traffic cannot be scheduled.

Options:

A.

True

B.

False

Buy Now
Questions 12

(Single) When you configure HUAWEI Network Management U2000 for FTTH IPTV service access, which of the following templates needs to be configured?

Options:

A.

SNMP template

B.

MGC template

C.

IGMP template

D.

Value-added service templates

Buy Now
Questions 13

The solutions to MAC address spoofing include:

Options:

A.

Limit the number of user MAC addresses that can be learned.

B.

Replace a user terminal.

C.

Automatically bind MAC addresses.

D.

Manually configure a static MAC address.

Buy Now
Questions 14

Which of the following multicast protocols is directly associated with the hosts? Specifically, routers running the protocol manage the joining and leaving of hosts in a multicast group and send multicast data to the hosts by querying the multicast forwarding table.

Options:

A.

PIM-DM

B.

MSDP

C.

PIM-SM

D.

IGMP

Buy Now
Questions 15

(Multi-select) You queried PPPoE simulation results on the MDU side as shown below. From the query results, it can be judged that:

(Note: the actual simulation output is not included in the prompt.)

Options:

Buy Now
Questions 16

If a customer needs to protect the ONU trunk optical path but does not need to protect the ONU branch optical paths, which PON line protection mode should be used?

Options:

A.

Type D

B.

Type B

C.

Type C

D.

Type A

Buy Now
Questions 17

In a campus project, XGS-PON is used; ONUs backhaul APs via a 1:16 splitter, but only 12 APs are actually connected per splitter. What is the downstream concurrent bandwidth per AP (Mbit/s)?

Options:

A.

About 600

B.

About 300

C.

About 800

D.

About 400

Buy Now
Questions 18

(Single choice) The following statement about defending MAC Spoofing is wrong:

Options:

A.

MAC Anti-MAC-Spoofing features are mutually exclusive with WMAC, SC, PPPoE-SMAC features at the VLAN level

B.

After the Anti-MAC-Spoofing function is enabled, the system automatically implements dynamic binding of the MAC address to the service flow

C.

After enabling the Anti-MAC-Spoofing function, for IPoE users using fixed IP, the user needs to be statically configured

D.

Turning off the Anti-MAC-Spoofing function can only remove the fixed table items, which does not affect the user’s service application, but the service forwarding plane will be interrupted

Buy Now
Questions 19

The scope of protection of the (multiple choice) GPON Type B dual attribution protection includes

Options:

A.

Primary and standby OLTs

B.

Primary and standby feeder fibers

C.

OLT’s primary and standby PON ports

D.

Primary and standby branch fibers

Buy Now
Questions 20

If the ONT zero touch provisioning function is enabled on the eSight, the OLT does not need to be preset during incremental configuration.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

(Single choice) The upstream wavelength of 10G-EPON is:

Options:

A.

1577 nm

B.

1270 nm (symmetric)

C.

1310 nm (asymmetric)

D.

1490 nm

Buy Now
Questions 22

Under IGMP snooping, there are two users on the OLT watching the same program, and the OLT sends two Join messages to the multicast router.

Options:

A.

wrong

B.

Right

Buy Now
Questions 23

Max-Forwards fields can be used in SIP messages to solve loop problems and avoid endless packet forwarding.

Options:

A.

wrong

B.

Right

Buy Now
Questions 24

(Radio) When the OLT global or VLAN service template enables the PITP switch, the service port allows the upstream packet to carry the Vendor tag, and the user side indeed carries vendor tag information. Which statement about OLT processing of PITP messages is correct?

Options:

A.

OLT adds a local Vendor tag to the upstream PITP packet

B.

OLT forwards the user-side PITP message directly without any processing

C.

OLT retains the Vendor tag carried in the upstream PITP message and adds the local Vendor tag

D.

OLT drops upstream PITP packets

Buy Now
Questions 25

The protection scope of GPON Type B dual-homing protection covers ( ).

Options:

A.

Active and standby backbone optical fibers

B.

Active and standby OLTs

C.

Active and standby PON ports of the OLT

D.

Active and standby branch optical fibers

Buy Now
Questions 26

The Class D multicast address range is from 224.0.0.0 to 238.255.255.255.

Options:

A.

True

B.

False

Buy Now
Questions 27

(Radio) The device periodically sends and receives LACP packets to avoid information loss. If no LACPDU is received within ( ) LACP interaction cycles, the system considers the member port Down.

Options:

A.

3

B.

5

C.

4

D.

2

Buy Now
Questions 28

(Multiple choice) When the OLT main control board CPU is detected to be continuously high, the following are possible causes:

Options:

A.

The user logged in illegally

B.

Network loops

C.

Cyber attacks

D.

Rogue ONU

Buy Now
Questions 29

Compared with Type C dual-homing protection, which of the following statements about Type C single-homing protection are correct?

Options:

A.

Protects important services such as enterprise and base station private line access services.

B.

When the OLT or uplink of the OLT is faulty, services can be switched to the other OLT.

C.

If the OLT is faulty, services are interrupted.

D.

The networking is simple, and the OLT and ONU management is simple.

Buy Now
Questions 30

The number of users under the OLT can also determine whether the VLAN is single-layer or dual-layer VLAN. Single-layer VLANs can be used when the number of users is small, and dual-layer VLANs must be used when the need to distinguish services and the number of users is second to ().

Options:

A.

2K

B.

4K

C.

CS

D.

1K

Buy Now
Questions 31

Which of the following is a RADIUS feature?

Options:

A.

The same transmission protocol as HWTACACS is used.

B.

You can adjust the fields to be encrypted in packets according to user requirements.

C.

After a user passes authentication, the returned message is different from that returned by the HWTACACS server.

D.

RADIUS has reliable transmission.

Buy Now
Questions 32

(Multiple select) When there is a backbone fiber break or the OLT raises a LOS (Loss of Signal) alarm because it does not detect the expected optical signal, the possible cause is:

Options:

A.

A rogue ONU exists under the port

B.

The port backbone fiber is faulty

C.

All ONUs under the port are powered off or faulty

D.

The port laser is turned off

Buy Now
Questions 33

When configuring IPTV services on the U2000, what templates are included in the IGMP templates?

Options:

A.

Permission templates

B.

Multicast user templates

C.

Program templates

D.

Preview parameter template

Buy Now
Questions 34

The OLT is configured to use IGMP Version 2. When the OLT receives an IGMPv3 Join (Report) message forwarded from an ONT, what action will it take?

Options:

A.

Normal forwarding

B.

Send a specific-group query message

C.

Send a general (universal) group query message

D.

Discard directly

Buy Now
Questions 35

The QoS should be planned according to service requirements. Generally, a service with a higher priority adopts the ( ) scheduling mode.

Options:

A.

PQ

B.

WRR

C.

DRR

D.

RR

Buy Now
Exam Code: H35-211_V2.5
Exam Name: HCIP-Access V2.5
Last Update: Nov 9, 2025
Questions: 117

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now H35-211_V2.5 testing engine

PDF (Q&A)

$43.57  $124.49
buy now H35-211_V2.5 pdf