In a wireless communication system, information is first converted into digital signals for easy circuit calculation and processing by the transmitter through source coding, and then converted into radio waves through channel coding and modulation. Which of the following parameters of a carrier are modified during the modulation process based on signal changes? (Select all that apply)
During modulation, the transmitter maps digital information onto certain physical characteristics of a carrier signal so that the information can be transmitted over the air. The three classic carrier parameters that can be modified are amplitude, frequency, and phase. Therefore, options A, B, and D are correct.
Amplitude modulation changes the strength of the carrier wave. Frequency modulation changes the oscillation rate of the carrier. Phase modulation changes the phase angle of the carrier relative to a reference. Modern wireless communication systems often combine these parameters, especially amplitude and phase, in complex digital modulation schemes such as QPSK, 16-QAM, 64-QAM, or higher-order QAM used in WLAN standards. Option C, channel, is not a carrier parameter modified during modulation. A channel refers to a frequency resource or spectrum allocation used for communication, not a physical waveform characteristic being directly altered to encode bits. HCIA-Datacom introduces these basic wireless concepts to help learners understand how WLAN signals are transmitted, how data rate improvements are achieved, and why different modulation methods have different requirements for signal quality and interference resistance.
Which of the following phases are required for establishing a connection between an SSH server and an SSH client? (Select all that apply)
The establishment of an SSH connection includes multiple mandatory phases that ensure both secure communication and authenticated access. First, the SSH client and server perform version negotiation to determine a mutually supported SSH protocol version. Then they carry out algorithm negotiation, during which they agree on the encryption algorithm, key exchange algorithm, integrity algorithm, and other security parameters to be used for the session.
After that, the peers perform key exchange, which is used to derive shared session keys securely over an insecure network. This stage is essential because it enables subsequent communication to be encrypted and protected against interception. Finally, once the secure channel has been established, user authentication is performed so that the server can verify the identity of the client user. This can be done using a password, public key, or other supported authentication method. Therefore, all four options are required phases in the SSH connection establishment process. HCIA-Datacom emphasizes these steps because SSH is a core secure management protocol used to replace insecure protocols such as Telnet and FTP in modern network operation and maintenance.
If a network device has both a static route and a direct route to network 10.1.1.0/24, it uses the direct route preferentially.
This statement is true. When a device has multiple routes to the same destination prefix, route selection is based first on the longest prefix match, and when prefix length is the same, the device compares the route preference or administrative priority associated with each routing source. On Huawei devices, a direct route has a better preference than a static route, so the direct route is selected first when both routes have the same destination and mask.
A direct route is generated automatically when an IP address is configured on an interface and that interface is Up. Because the destination network is directly connected, this route is considered more trustworthy and efficient than a manually configured static route pointing to the same prefix. HCIA-Datacom uses this principle to explain route selection, routing-table generation, and troubleshooting cases where a configured static route does not appear as the active route because a direct or dynamic route has higher priority. This is a basic but important concept in IP forwarding and helps engineers correctly interpret routing tables on Huawei routers and Layer 3 switches.
In the leader AP networking architecture, the leader AP functions as a WAC and uses the CAPWAP protocol to uniformly manage and configure Fit APs.
This statement is true. In the leader AP networking architecture, one AP acts as the leader AP, taking on controller-like functions similar to those of a WAC for a small or medium-sized WLAN deployment. It can centrally manage other Fit APs and deliver unified wireless configurations such as SSIDs, security settings, and radio parameters. CAPWAP is used for management and control communication between the leader AP and the managed Fit APs.
This architecture is useful in scenarios where deploying a dedicated WAC is unnecessary or uneconomical, but centralized AP management is still desired. It provides a balance between simplicity and control and is commonly used in branch offices, small campuses, and similar environments. HCIA-Datacom explains leader AP networking as an intermediate solution between fully autonomous AP deployment and full WAC + Fit AP enterprise architecture. The key point is that the leader AP behaves as the management node for the other APs and enables unified configuration and control. Therefore, the statement correctly describes both the role of the leader AP and the use of CAPWAP in this architecture.
Secure Shell (SSH) is a protocol that uses encryption and authentication mechanisms to implement network services, such as secure access and file transfer, securely over an insecure network. Which of the following protocols use SSH? (Select all that apply)
Several upper-layer management and file transfer protocols use SSH as their secure transport foundation. SFTP is the SSH File Transfer Protocol and operates over SSH, making option C correct. STelnet is secure Telnet implemented over SSH, so option D is also correct. NETCONF commonly uses SSH as its transport protocol for secure configuration management and device orchestration, making option B correct as well.
Option A, DNS, does not use SSH as its normal transport protocol. Traditional DNS operates over UDP or TCP port 53, depending on the query or transfer type. Although DNS security extensions and encrypted DNS variants exist, they are not based on SSH. HCIA-Datacom emphasizes the role of SSH in secure network management because it replaces insecure plaintext protocols and provides confidentiality, integrity, and authentication. In practical Huawei enterprise deployments, SSH-based protocols are widely used for interactive device login, automated configuration delivery, and secure file operations. This question tests recognition of management protocols that inherit SSH's secure channel rather than protocols that operate independently at the application layer.
Currently there are no comments in this discussion, be the first to comment!