Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

If a network port that supports autonegotiation is connected to a network port that does not support autonegotiation, you can interconnect in both half-duplex and full-duplex modes.

A.

True

B.

False

LCK insertion takes precedence over AIS insertion. That is, if the user configures LCK insertion and the conditions for automatic AS insertion are met, the LCK is inserted.

A.

True

B.

False

If the overhead bytes pass through two plugged backplane buses, then the two slots are called paired slots that enable automatic transparent transfer of overhead bytes, such as (), () and (). Even if the SCC on the local network element The board is offline, which can also improve msP switching performance and protect DCC communication with other network elements. (Multi-quality selection).

A.

K bytes

B.

D bytes

C.

E1 bytes

D.

B1 word strip

When the U2000 is synchronized, the same network metadata as the U2000 is not uploaded to the U2000, and the data that exists on the U200 but does not exist on the network element is deleted.

A.

True

B.

False

Which of the following ITLI-T recommendations define the OTN frame structure?

A.

G.694

B.

G.652

C.

G.975

D.

G.709

Automatic Laser Shutdown (ALS): When no optical signal is received, the ALS function automatically turns off the corresponding optical module. This feature protects field maintenance personnel.

A.

True

B.

False

The working mode of the port determines the flow control mode of the port.

When the operating mode is 100Mbit/s full duplex, one of the following flow control modes can be used

A.

Auto-negotiation flow control mode

B.

Non-autonegotiation flow control mode

C.

Both

D.

None of the above

Which of the following bridges are used to forward data based on the MAC address and VLAN ID carried in the data?

A.

8021a

B.

802.1d

C.

802.1q

D.

802.11from

Which of the following statements about signal label byte C2 are incorrect?

A.

The A.C2 byte is used to indicate the multiplexed structure and payload properties of the VC frame.

B.

The C2 section to be sent must match the C2 bytes to be received.

C.

If the check to C2 byte does not match, the LP-SLM alarm is reported in the corresponding VC-4 channel.

D.

C2=00H Jizong VC4 is not equipped.

Which of the following bytes can be used for wired phones between two REG devices?

A.

E1

B.

E2

C.

E1 and E2

D.

None of the above