Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

H3C GB0-360 Exam -

Free GB0-360 Sample Questions:

1. Which are the advantage of the hierarchical network design model?
A. Easy to extend
B. Easy for diagnosis and troubleshooting
C. Easy for management
D. Cost saving
Answer: ABCD

2. A topology has to be chosen for a LAN or a WAN. Which topology has the smallest delay, the highest reliability but the most complicate management?
A. Star
B. Tree
C. Ring
D. Mesh
Answer: D

3. Which of the following is the network operation system that Huawei has intellectual proprietary and it supports multiple equipments of Huawei?
D. Quidway
Answer: C

4. All work stations can make full use of the bandwidth in the CSMA/CD network.
A. True
B. False
Answer: B

5. Which of the following support data forwarding and path selection?
A. S3026E
B. S3526E
C. Routers
D. Hubs
Answer: BC

6. A frame relay network can be full-meshed. If there are 6 routers connected to the frame relay network, the required number of PVCs will be.
A. 6
B. 5
C. 15
D. 30
Answer: C

7. POS is a technology to bear IP and other packets over the SONET/SDH. Which layer is POS defined in the OSI model?
A. Data link layer
B. Physical layer
C. Network layer
D. Transport layer
E. Application layer
Answer: A

8. To transmit IP voice, compression algorithm is adopted, such as the frequently used G.729. After compressed, what is the bandwidth seized by a channel of voice?
A. 75Kbps
B. 12Kbps
C. 64Kbps
D. 8Kbps
Answer: B

9. Which of the following can be aggregated into one Route entry
Answer: AC

10. The DR in the OSPF is to reduce the amount of broadcast and to decrease the Link State Database synchronization times between routers in the NBMA network. However, it is meaningless when there are less than 3 routers in the network. So it is unnecessary to elect the DR when there are only 2 routers in the broadcast and Ethernet network.
A. True
B. False
Answer: B

11. To guarantee that backup is enabled while the network storm is prevented when designing LAN, the SPANNING TREE technology or TRUNK port aggregation technology can be adopted.
A. True
B. False
Answer: A

12. Which of the following descriptions of the security of the leased line access method are true?
A. As a traditional access mode, the leased line transmits data in the transparent channel mode in the physical layer. The semi-permanent connection is performed between two points by the line providers, so the line is of high security.
B. The secure access control and the authentication interworking are considered for this access method.
C. Encryption can be adopted in the leased line for a higher security
D. All the above descriptions are false
Answer: ABC

13. Which of the following descriptions of the PQ queue strategy are true?
A. PQ can provide different priorities to different service data packets, and can provide absolute priority to the high priority packet.
B. PQ is used to guarantee the delay of the real-time application sensitive to the time like VOIP.
C. As CQ, PQ needs to be configured, but its processing speed is faster.
D. Because PQ cannot restrict the bandwidth of the high priority packet, the low priority packet may get no bandwidth.
Answer: ABD

14. Which of the following items should be considered when making network plan?
A. Equipment purchase
B. Analysis of the physical locations and the requirements of the customers
C. IP address planning
D. Network equipment deployment
E. Network topology designing
Answer: BCE

15. Which of the following are needed to construct an Enterprise network?
A. Operation system
B. PCs
C. Routers
D. Ethernet switch
Answer: ABCD

16. The life cycle of a network does not include the maintenance phase.
A. True
B. False
Answer: B

17. Users vary in requirements for the network. Which of the following should not be included at the stage of requirement analysis?
A. Understand the amount of the investment made by the user
B. Have a clear idea of the current situation of the running network
C. Understand what should be solved in the network
D. Determine the network topology
Answer: D

18. The first step for network analysis is to collect the requirement of the user, which of the following are right about the requirement source?
A. The requirement source may be affected by the policy of country or industry.
B. The idea of the decision maker has a great impact over the requiremenA.
C. History data
D. Communication with the technician from the side of user will help you get the information.
Answer: ABCD

19. Which of the following will affect the scalability of the network?
A. Personnel changes
B. Requirement for remote office
C. Requirement for mobile office
D. Service changes
Answer: ABCD

20. The network designer communicates with the user to get the requirement for the network. What should be paid attention at this stage?
A. Understand the organization hierarchy of the user and find the appropriate person to consulA.
B. Differentiate what requirement are to be fulfilled in practice by the user, what to be fulfilled in the design
C. List the requirement for the network performance
D. Obtain the investment details
Answer: ABCD

21. There is a contradiction presented in most of the network design. A true understanding of it will help to improve the performance of the network under design. What is the contradiction?
A. Network security and real-timeness
B. Cost and network performance
C. Investment and network scalability
D. Network reliability and response time
Answer: B

22. Which of the following should be considered during your requirement collection for mainframe computer?
A. Backups
B. Security
C. Usage rate
D. Database
Answer: ABCD

23. Different computer-Platform have different requirement for performance and functions. Which of the following can be used in making assessment to the performance of the computer-Platform?
A. Performance of the processor
B. Memory
C. The Operating System
D. Network configuration
Answer: ABCD

24. You need to know the protocol adopted for networking. In 1970s a network architecture developed by IBM was widely used in the financial network. What is it??
D. AppleTalk
Answer: C

25. Security is vital for the network management, so it is necessary to implement the same security policy to any data stream in the network.
A. True
B. False
Answer: B

26. Which of the following are the requirement for the network?
A. Physical topology
B. Protocols
C. Security
D. Network equipment
E. WAN connection type
Answer: ABCDE

27. When collecting the requirements for the network, you should know what equipments the customer is using and whether they can meet the requirement of the new network. Which of the following are the equipment to fulfill the function of network layer?
A. Hubs
B. Routers
C. Layer 3 Ethernet switches
D. Modems
Answer: BC

28. Which protocol is developed by the Advanced Peer-to-Peer Networking (APPN) Implementers Workshop (AIW) to transmit SNA through TCP/IP network?
A. Frame Relay
B. X.25
Answer: C

29. You should make a analysis according to the information collected for the network design. Which of the following should among your consideration for the network with data, voice and video transmission?
A. Network scale
B. Reliability
C. Real-time
D. WAN connection type to be adopted
Answer: ABCD

30. Which of the following are the layer in the network design model?
A. Core layer
B. Convergence layer
C. Access layer
D. Network layer
Answer: ABC

© 2014, All Rights Reserved