Questions, Answers, Braindumps (GB0-360)
is cleared. I got material from www.exams.ws and succedded.
Here are some of my questions as brain dumps.
Which are the advantage of the hierarchical network
A. Easy to extend
B. Easy for diagnosis and troubleshooting
C. Easy for management
D. Cost saving
Q:2 A topology has to be chosen for a LAN or a WAN.
Which topology has the smallest delay, the highest
reliability but the most complicate management?
Q:3 Which of the following is the network operation
system that Huawei has intellectual proprietary and
it supports multiple equipments of Huawei?
Q:4 All work stations can make full use of the bandwidth
in the CSMA/CD network.
Q:5 Which of the following support data forwarding
and path selection?
Q:6 A frame relay network can be full-meshed. If there
are 6 routers connected to the frame relay network,
the required number of PVCs will be.
Q:7 POS is a technology to bear IP and other packets
over the SONET/SDH. Which layer is POS defined in
the OSI model?
A. Data link layer
B. Physical layer
C. Network layer
D. Transport layer
E. Application layer
Q:8 After compressed, what is the bandwidth seized
by a channel of voice?
Q:9 Which of the following can be aggregated into
one Route entry 10.0.24.0/21?
Q:10 The DR in the OSPF is to reduce the amount of
broadcast and to decrease the Link State Database
synchronization times between routers in the NBMA
network. However, it is meaningless when there are
less than 3 routers in the network. So it is unnecessary
to elect the DR when there are only 2 routers in the
broadcast and Ethernet network.
Q:11 To guarantee that backup is enabled while the
network storm is prevented when designing LAN, the
SPANNING TREE technology or TRUNK port aggregation
technology can be adopted.
Q:12 Which of the following descriptions of the security
of the leased line access method are true?
A. As a traditional access mode, the leased line transmits
data in the transparent channel mode in the physical
layer. The semi-permanent connection is performed
between two points by the line providers, so the line
is of high security.
B. The secure access control and the authentication
interworking are considered for this access method.
C. Encryption can be adopted in the leased line for
a higher security
D. All the above descriptions are false
Q:13 Which of the following descriptions of the PQ
queue strategy are true?
A. PQ can provide different priorities to different
service data packets, and can provide absolute priority
to the high priority packet.
B. PQ is used to guarantee the delay of the real-time
application sensitive to the time like VOIP.
C. As CQ, PQ needs to be configured, but its processing
speed is faster.
D. Because PQ cannot restrict the bandwidth of the
high priority packet, the low priority packet may
get no bandwidth.