If you are thinking about taking the HCIA-Access H35-210_2-5 exam, there are many ways to prepare for it. For starters, you can use PDF files to prepare for the exam.
Question: 1
Which of the following are the methods and ideas for locating abnormal XDSL dial-up faults?
A. Check the ATM package format of MODEM
B. Confirm whether the MODEM configuration is correct
C. Query the traffic of the xDSL port to determine whether there is normal business traffic with the terminal
D. Confirm whether the gateway can be pinged from the client Product Questions:\
Answer: A,B,C,D
Question: 2
What is the difference between alarm shielding and alarm suppression?
A. When setting the alarm shielding function, the network element will still report the alarm, but the network management will not receive it; when the alarm suppression is set, the network element will no longer report the alarm
B. When the alarm shielding function is set, the network element will no longer report the alarm; when the alarm suppression is set, the network element will still report the alarm, but the network manager will not receive it.
C. When setting the alarm shielding function, the network element does any processing.
D. There is no difference
Answer: A
Question: 3
According to whether the UA2000 alarm is confirmed and cleared, what are its alarm states?
A. Unconfirmed and uncleared
B. Confirmed but not cleared
C. Unconfirmed and cleared
D. Confirmed and cleared
Answer: A,B,C,D
Question: 4
What are the alarm levels of U2000?
A. Fatal
B. Urgent
C. Important
D. Secondary
Answer: B,C,D
Question: 5
command... What is the correct description of the three points in ./.profile?
A. The first point. Means execution, same as sh
B. The second point. Connected to the back /, ./ indicates the current directory
C. The third point. Connected to the previous /, which means the root directory
D. The third point. Before profile, the entire .profile is a file name, which means a hidden file
Answer: A,B,D
Question: 6
In the Solaris 10 operating system, when only ordinary users can ftp to the network management server, which file should be modified so that the root user can also remotely ftp to the server?
A. /etc/ftpusers
B. /etc/services
C. /etc/system
D. /etc/defaultrouter
Answer: A
Question: 7
Which of the following isql login database commands is correct?
A. isql -Usa_password -Ssa -PN2000DBServer
B. isql -Usa -Ssa_password -SN2000DBServer
C. isql -Usa -PN2000DBServer -Ssa_password
D. isql -Usa -Psa_password -SN2000DBServer
Answer: D
Question: 8
Which of the following commands is used to close the main server of Sybase System?
A. shutdown SYS_MAIN
B. shutdown SYS
C. shutdown
D. Shutdown
Answer: C
Question: 9
What factors affect the actual line rate of ADSL business?
A. Line length
B. Wire diameter