GB0-391 Dumps GB0-391 Braindumps GB0-391 Real Questions GB0-391 Practice Test GB0-391 Actual Questions H3C GB0-391 Constructing Secure Optimized WANs V2.0 https://killexams.com/pass4sure/exam-detail/GB0-391 Question: 70 In ADSL of PPPoE applications, when the CPE side using MSR router + ADSL interface card for networking, CO.'S side DSLAM using ATM uplink time, deposit CPE needs to interface on the router which side ( irrespective CPE side LAN Connection ) ? A. DSL interface B. Yi Tai Ethernet port C. Virtual-Ethernet D. Virtual-Template E. dial number Interface Answer: A,E Question: 71 In the PPPoE application of ADSL , when the CPE side uses the MSR router + ADSL interface card for networking, and the CO side DSLAM uses ATM for uplink, which interfaces need to be PPPoE- related on the CO side centralized router ( PPPoE Server ) Configuration ? A. ATM interface B. Yi Tai Ethernet port C. Virtual-Ethernet D. Virtual-Template E. dial number Interface Answer: A,C,D Question: 72 In ADSL of PPPoE applications, when the CPE side using MSR router + ADSL interface card for networking, co side DSLAM make use IP rows on the co centralized router side ( PPPoE Server ) need to be on which interfaces PPPoE relevant The configuration ? A. ATM interface B. Yi Tai Ethernet port C. Virlual-Ethernet D. Virtual-Template E. dial number Interface Answer: A,B,D Question: 73 The frequency band used to transmit data in ADSL2+ is ____ . A. 20KHz ïœ 1MHz B. 0 ïœ 4 KHz C. 1.1MHz ïœ 2_2MHz D. 20KHz ïœ 2.2MHz E. High in 10MHZ Answer: D Question: 74 Among the following ADSL standards, the one that does not need to use a splitter is ____ .( Choose one or more ) A. ITU 992.1 B. ITU 992.2 C. ITU 992.3 D. ITU 992.4 Answer: A,B,D Question: 75 An operator hopes to deploy ADSL ( ADSL2 ) to kill the system in a community with relatively dense users and short transmission distance .Users do not require high bandwidth, and pay more attention to its economy and ease of installation and maintenance. Based on the above requirements, when choosing ADSL ( ADSL2 ) standard, the ideal is ____ .( Choose one or more ) A. ITU 992.1 B. ITU 992.2 C. ITU 992.3 D. ITU 992.4 Answer: A,B,D Question: 76 The theoretical transmission rate of ADSL data is related to which of the following options ? A. Line Road activate consultations B. Number of sub- carrier channels C. modulation system rate D. Sub- carrier channel rate Answer: A,B,C,D Question: 77 The VPI/VCI parameters of ADSL connection are negotiated and determined in ____ . A. Line Road activate B. DMT modulation C. Jian Li low-level link VCC D. PPPoE negotiation Answer: C Question: 78 Common VPI/VCI values ââ in ADSL applications include ____ .( Choose one or more ) A. 0/30 B. 0/35 C. 0/32 D. 0/16 Answer: A,B,C Question: 79 Which of the following statements about the improvement of ADSL2 relative to ADSL is correct: ( Choose one or more ) A. The frequency band of ADSL2 is twice that of ADSL B. At the same transmission rate, ADSL2 can transmit longer distances than ADSL C. Compared with ADSL, ADSL2 adds a new operating mode D. ADSL can support flexible bandwidth binding function, such as IMA ( Inverse Multiplexing forATM , ATM inverse multiplexing ) Answer: A,B,C,D Question: 80 Among the following VPN technologies, those belonging to the third layer VPN are ____ .( Choose one or more ) A. L2TP VPN B. BGP/MPLS VPN C. VLL D. IPSec VPN Answer: A,B,D Explanation: Three layers: IPSEC , GRE , MPLS VPN Question: 81 The following VPN technology, belonging to the second layer of VPN are ____ .( Choose one or more ) A. VPLS B. VLL C. GRE VPN D. IPSec VPN Answer: A,B Question: 82 Which of the following VPN technologies are suitable for enterprise employees to remotely access the enterprise private network through the Internet ? ( Choose one or more ) A. SSL VPN B. L2TP VPN C. GRE VPN D. BGP/MPLS VPN Answer: A,B Question: 83 Which of the following VPN technologies are suitable for corporate employees on business trips to remotely access the corporate network through the Internet ? A. BGP/MPLS VPN B. GRE VPN C. SSL VPN D. VLL Answer: C Question: 84 The incorrect description of L2TP VPN and GREVPN is ____ .( Choose one or more ) A. all point to point VPN B. Both support tunnel verification C. Both support dynamic address acquisition D. are based on UDP encapsulation Answer: A,C,D Question: 85 About L2TP VPN and GRE VPN are correct is ____ .( Choose one or more ) A. all point to point VPN B. Both support tunnel verification C. All belong to L3 VPN ( Laer 3 VPN , Layer 3 VPN ) technology D. are based lP package Answer: B Question: 86 Which description is correct about L2TP VPN and SSL VPN? A. All need to install and maintain the client B. Both support Web access C. All support lP access mode D. are based on UDP encapsulation Answer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