Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

H35-211_V2.5 HCIP-Access V2.5 Questions and Answers

Questions 4

(Multi-select) eSight is network management software positioned for enterprise networks and can view ONT device details, including which of the following?

Options:

A.

ONT port information

B.

Speed

C.

Optical module temperature

D.

The optical module transmit power

Buy Now
Questions 5

The DBA scheduling of the GPON system is only for the upstream traffic, and the downstream traffic cannot be scheduled.

Options:

A.

True

B.

False

Buy Now
Questions 6

(Single choice) The following statement about defending MAC Spoofing is wrong:

Options:

A.

MAC Anti-MAC-Spoofing features are mutually exclusive with WMAC, SC, PPPoE-SMAC features at the VLAN level

B.

After the Anti-MAC-Spoofing function is enabled, the system automatically implements dynamic binding of the MAC address to the service flow

C.

After enabling the Anti-MAC-Spoofing function, for IPoE users using fixed IP, the user needs to be statically configured

D.

Turning off the Anti-MAC-Spoofing function can only remove the fixed table items, which does not affect the user’s service application, but the service forwarding plane will be interrupted

Buy Now
Questions 7

(Radio) When using the SIP protocol, a local digitmap is used for matching. If you use the default matching mode to match a 7-digit number beginning with 7727, which of the following configurations is valid?

Options:

A.

local-digitmap add huawei normal 7727xxx/7726.

B.

local-digitmap add huawei normal 772./7727xxx

C.

local-digitmap add huawei normal 7727

D.

local-digitmap add huawei normal 7727xxx/7727

Buy Now
Questions 8

In the NGN system, the ( ) adopts the packet technology to provide a unified integrated transmission platform with high reliability, QoS guarantee, and large capacity.

Options:

A.

Network control layer

B.

Core switching layer

C.

Service management layer

D.

Edge access layer

Buy Now
Questions 9

Max-Forwards fields can be used in SIP messages to solve loop problems and avoid endless packet forwarding.

Options:

A.

wrong

B.

Right

Buy Now
Questions 10

The number of users under the OLT can also determine whether the VLAN is single-layer or dual-layer VLAN. Single-layer VLANs can be used when the number of users is small, and dual-layer VLANs must be used when the need to distinguish services and the number of users is second to ().

Options:

A.

2K

B.

4K

C.

CS

D.

1K

Buy Now
Questions 11

The maximum spectroscopic (split) ratio supported by 10G GPON is (Radio)?

Options:

A.

1:64

B.

1:256

C.

1:128

D.

1:32

Buy Now
Questions 12

When configuring IPTV services on the U2000, what templates are included in the IGMP templates?

Options:

A.

Permission templates

B.

Multicast user templates

C.

Program templates

D.

Preview parameter template

Buy Now
Questions 13

On a Layer 2 network, which protocol can be used to better control multicast traffic forwarding?

Options:

A.

PIM-DM

B.

HGMP

C.

IGMP-proxy

D.

PIM-SM

Buy Now
Questions 14

(Single choice) The following statement about the PITP protocol is incorrect

Options:

A.

The PITP protocol includes PITP P mode and PITP V mode

B.

The purpose of the PITP feature is to provide the upper authentication server with the physical location information of the access user, and the BRAS device can realize the user account and the press position after obtaining the user access location information

C.

Bind the authentication of the information to avoid the theft and roaming of the user account

D.

In PITP V mode, the user ' s physical location information is added to the PPPoE message sent by the user side to cooperate with the upper-level server for user authentication

E.

PITP P mode can also be called PPPoE+ mode

Buy Now
Questions 15

Assume that there are 500 broadband users with a concurrency rate of 40%, penetration rate of 50%, online bandwidth of 4 Mbit/s, duty cycle of 12.5%, 1 channel, and coverage rate of 70%. Then the bandwidth is 35 Mbit/s.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

(Radio) The downstream effective bandwidth of a GPON PON port is:

Options:

A.

2 Gbit/s

B.

1.25 Gbit/s

C.

2.5 Gbit/s

D.

2.2 Gbit/s

Buy Now
Questions 17

When the H.248 protocol is used to deploy the VoIP service, the registration information sent by the MG to the MGC contains the following information:

Services {Method=Restart Reason=[901]}

Which command can trigger the information?

Options:

A.

ONT re-register

B.

Board restart

C.

Reset coldstart

D.

Reboot system

Buy Now
Questions 18

Which of the following statements about the implementation of VLAN Layer 2 intercommunication through ARP proxy and VLAN service-profile is correct?

Options:

A.

Compared with the VLAN service profile, ARP proxy saves IP addresses.

B.

Both of them can implement Layer 2 isolation of smart VLANs.

C.

The ARP proxy must be configured on the OLT to solve the voice interworking problem.

D.

The VLAN service profile must be configured on the ONU to implement voice communication.

Buy Now
Questions 19

If the ONT zero touch provisioning function is enabled on the eSight, the OLT does not need to be preset during incremental configuration.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

The (radio) prerequisites for eSight to automatically discover OLT and MXU devices by IP address are not included

Options:

A.

eSight and the device need to be on the same network segment, otherwise the device cannot be discovered using the ARP broadcast protocol.

B.

You already have the operation permission of " Resource Access " .

C.

eSight and the device can be routed to communicate (ping each other).

D.

The SNMP parameters on the eSight side have been configured and are aligned with the device side SNMP parameters.

Buy Now
Questions 21

After the anti-IP attack function is enabled on an OLT, the OLT cannot be remotely managed through Telnet.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Multicast technology effectively solves the problem of single-point transmission and multipoint reception, and realizes efficient data transmission from one point to multiple points in an IP network.

Options:

A.

wrong

B.

Right

Buy Now
Questions 23

Which one of the following protection schemes can provide OLT-level protection?

Options:

A.

Type B dual-homing

B.

Ethernet port protection group

C.

LACP

D.

Type B single-homing

Buy Now
Questions 24

In a campus project, XGS-PON is used; ONUs backhaul APs via a 1:16 splitter, but only 12 APs are actually connected per splitter. What is the downstream concurrent bandwidth per AP (Mbit/s)?

Options:

A.

About 600

B.

About 300

C.

About 800

D.

About 400

Buy Now
Questions 25

According to the NGN architecture, drag the following devices to the corresponding layers. (Score only when all the answers are correct.)

H35-211_V2.5 Question 25

Options:

Buy Now
Questions 26

Which of the following options can improve the service experience of multicast users when switching channels (shorter switching time)?

Options:

A.

When adding a multicast program, disable the pre-join feature

B.

Enable Quick (Fast) Leave when adding a multicast user

C.

When you add a multicast user, enable the preview feature

D.

Use group addresses with small values

Buy Now
Questions 27

After anti-DoS attack is configured, the system periodically checks all user ports on the board. If the system detects attacks for multiple consecutive times, the system adds the corresponding port to the blacklist and waits for a random period before a new round of detection to determine whether to remove the port from the blacklist.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

(Radio) When the INVITE message sent by user A reaches user B after passing through servers C, D, and E, the Via header field entries recorded in the message received by user B appear in which order (top to bottom)?

Options:

A.

C → D → E

B.

E → C → D

C.

E → D → C

D.

C → E → D

Buy Now
Questions 29

(Radio) Regarding the H.248 connection model, which description is correct?

Options:

A.

The connection model cannot be modified during a user session

B.

When the session between two users ends, the corresponding association is used

C.

A media gateway that supports only point-to-point connections can allow three or more endpoints in the same association at the same time

D.

When the user call is successful, the empty connection (context) starts to be created

Buy Now
Questions 30

(Single) When you configure HUAWEI Network Management U2000 for FTTH IPTV service access, which of the following templates needs to be configured?

Options:

A.

SNMP template

B.

MGC template

C.

IGMP template

D.

Value-added service templates

Buy Now
Questions 31

(Single-choice) An IPTV user reports the TV cannot be watched. After enabling OLT debug for multicast/IGMP, the printed information (authorization result) indicates the conclusion below. This can be judged by the results of the query:

Options:

A.

The PON port multicast bandwidth is insufficient

B.

The user does not have permission to watch the show

C.

IGMP Snooping failure

D.

User bandwidth validation failed

Buy Now
Questions 32

The priority of the packets at the egress port can be mapped or set directly. Which of the following statements about priority processing is correct?

Options:

A.

The priority policy must be tag-in-package regardless of the priority setting mode.

B.

The priority mapping can be set separately for the inner and outer priorities.

C.

The priority mapping needs to match the corresponding mapping profile. The mapping in a profile is fixed.

D.

Priorities of outbound and inbound packets are strictly mapped. An outer VLAN ID cannot be mapped to the priority of an inner VLAN ID.

Buy Now
Questions 33

During troubleshooting, you can obtain multiple requests and response messages in a session by capturing packets. Which of the following options can be used to confirm the mapping between requests and response packets?

Options:

A.

Branch ID

B.

From

C.

CSeq

D.

Tag

Buy Now
Questions 34

Which of the following H.248 commands can be sent by the MG?

Options:

A.

AuditValue

B.

Add

C.

ServiceChange

D.

Notify

Buy Now
Questions 35

(Multi-select) You use an OTDR to locate an abnormally attenuated point on the optical path. After connecting the OTDR to the line under test, which of the following parameters can be set?

Options:

A.

Set the measurement range

B.

Set the wavelength

C.

Set the mode

D.

Set the pulse width

Buy Now
Exam Code: H35-211_V2.5
Exam Name: HCIP-Access V2.5
Last Update: May 7, 2026
Questions: 117

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now H35-211_V2.5 testing engine

PDF (Q&A)

$43.57  $124.49
buy now H35-211_V2.5 pdf