Theoretical examination questions of network administrators
Senior network administrator theory exam topic 1, wiring system is closely related to (). (2 points) Network architecture LAN building integrated transmission medium 2. For general telephone lines, which of the following twisted pair can meet the requirements (2 points) 2 3 4 5 3. In a network composed of multiple routers, people find it impossible to ping through routers. Can use configuration management tools to collect () information for analysis (2 points) router traffic statistics router routing table router MAC address router port number 4, ftp command parameters, (2 points) parameter limit ftp automatic login (2 points) -v -n -d -g 5, the horizontal distance between information socket and power socket should be at least (2 points)10cm 20cm 40cm 6, Which of the following parameters is used by the tracert command to display Ethernet statistics () (2 points) -a -e -s -r 7. The basic task of the network operating system is to shield the differences between local resources and network resources, provide users with various basic network service functions, and complete the management of network resources. And provide network system () (2 points) www service, security service, multimedia service and e-mail service 8. The following is not a mail protocol () (2 points), and the cable bending angle shall not be (2 points). Whether it is greater than 90 degrees and less than 90 degrees equals 90 degrees, 10, how to use the bandwidth of the switch port (2 points) * * * Enjoy independence 1 1, asp files can be run directly in FRONTPAGE2000. (2 points) True or false 12. In order to support Chinese, the value of the encoding attribute in the XML declaration should be set as: (2 points) UTF-8 UTF-16 BIG5GB231213, and the area of the grounding wire should not be less than (2 points) 2 3 4 5 14, which is a network interconnection device with the ability to isolate broadcast information. Bridge relay router L2 switch 15, asp page must be suffixed with *. Asp is running normally. (2 points) True or false 16. The following tools and software can't be used to design HTML pages (2 points): Dreamweaver WordFrontPage Outlook Express17. Unshielded twisted pair consists of four twisted pairs, and eight wires are wrapped with protective layers. The colors of the eight lines are different. Among them, green and white-green cable pairs are (2 points) 1, 2 7, 8 6, 3 4, 5 18. The advantages of using optical cable in the network are (2 points) cheap and easy to install, which is an industrial standard. It can be bought in any electrical store, and its transmission rate is higher than that of coaxial cable or twisted pair, and it is not affected by external electromagnetic interference and noise. Low bit error rate of 19. If you know the IP address of the wooden host, now you can query the host name of the target host according to the IP address. You can use the () command to ping the target host IP address netstat target host IP address tracert target host IP address nslookup-Qt = MX target host IP address 20. When an asp program runs on an IIS server, IP _ _ _ _ stands for the local computer. (2 points)128.0.0.129.0.0.192.168.1.70120. In the network environment, each user can access not only the local storage on the local machine, but also some external storage on the disk server, which can () (2 points) make all network users on the Internet. * * * Enjoy the read-only data of the disk server. The cost of configuring the user computer network without local disks is low, that is, the diskless workstation improves the utilization rate of valuable disks and gives full play to the characteristics of centralized control of the host and local storage of the client. All the above are true. 23. Double quotation marks can be used as comments in asp (2 points) right or wrong. 24.ASP procedure is blank, and it should be filled in: (2 points) a b c d 25. The following are not network protocol failures: () (2 points) The computer can't log on to the server computer, and it can't see itself in the online neighbors. It is also impossible to access other computers on the network. Network cable, jumper or information socket is faulty. The computer can't access the Internet through the local area network. Activity server page activity script page action server page action script paper 27. The following characteristics can be used as network security: () (2 points) Confidentiality * * Enjoyability, integrity and controllability 28. Firewall is a barrier between trusted network and untrusted network. Its purpose is () (2 points) to protect a network from virus attacks, so that one network has nothing to do with another network. None of the above is true. 29. The service type that ATM supports Web browser to query information is () (2 points) UBR ABR VBR CBR 30. Chinese meaning of sql language: (2 points) server query language, server structure language, structured query language, structured text language 3 1, which DMZ calls (2 points) security zone, isolation zone, ceasefire zone, danger zone 32, and the most important thing is (2 points) the number of interfaces that can be exchanged, and the network management can exchange 33 in three layers. The ping command shows that the time unit between sending the echo request and returning the echo reply is () (2 minutes) milliseconds, seconds, minutes and hours. 34. A transmission medium is a physical path between a sender and a receiver in a network. Among the following transmission media, (2) telephone lines, optical cables and twisted-pair coaxial cables have the highest transmission rate, the smallest signal transmission attenuation and the strongest anti-interference ability; (2) the protocol structure of local area network does not include () (2) the physical layer data link layer 36 is the network layer media access control layer, and firewalls are divided into three types (2) packet filtering firewalls according to the implementation principle. In the application layer gateway firewall and state detection firewall, application layer gateway firewall and proxy firewall packet filtering firewall, proxy firewall and software firewall state detection firewall, proxy firewall and dynamic packet filtering firewall 37, html tag, _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ (2 points) 38. Generally, the transmission distance of five types of twisted pair is not more than (2 points) 50 80 100 150 39. Intranet should be interconnected with Internet. The necessary interconnection equipment is () (2 points) repeater router switch modem 40, and the performance and function of high-speed local area network are improved by () (2 points) the transmission speed of software and hardware network operating system network cable, and the performance of computer CPU is 4 1. After adopting full duplex technology in the following local area network standards, The network segment distance can be extended () (2 points)100basetx100baset100basefx65438 There are several IP addresses: () (2 points) 4 5 6 7 43. Design, function, factors that have an important impact on reliability and cost are () (2 points) bit error rate. Distance between the subordinate structure network and the network transmission rate 44. There are many kinds of dedicated lines to access the Internet, among which digital communication channels such as optical fiber, copper wire, digital microwave or satellite are used to provide permanent or semi-permanent connection circuits. The transmission network used to transmit digital signals is: () (2 points) DDN mode ISDN mode xDSL mode Modem mode 45. Which of the following addresses is the broadcast address (2 points) 255.255.255.255.255.255.0.0127.0.0. Among the following options, () function that does not belong to the security management part of the network management system (2 points) A. Determine the sensitive information that needs to be protected B. Find out the access point and protect it C. Conduct attack tests on the access point regularly, and alert the network administrator if the test fails D. Maintain the secure access point 47. The sign of establishing hyperlinks is: (2 points) -> 48. For a network administrator, the goal of network management is not (). 49. ping another host with the ping command. Even if the correct answer is received, it cannot be said that () (2 points) the destination host can reach the ICMP software and IP software of the source host. The network through which the ping message passes has the same MTU. The router route through which the ping message passes is normal. 50.IBM token ring network mainly uses () medium. (2 points) Coaxial cable and optical fiber twisted pair optical fiber twisted pair and optical fiber