版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、計(jì)算機(jī)網(wǎng)絡(luò)基礎(chǔ)(Computer network foundation)Comprehensive base (computer network knowledge) question bank(total 75)Comprehensive base (computer network knowledge) question bank 21.1 single option (1 point, 36 questions) 21.2 multiple choices (2 points, 7 questions) 101.3 judgment right and wrong (1 point, 1
2、0 questions) 12Fill in the blanks (1 point each time, 22) 131.5 short answer (0 question) 15Description:The forms of the test include: single election, multiple choice, judgment, fill blank, brief description and discussion, and give the score and answer to each track.Score standard: 1. Choose 2 poi
3、nts for each item; Fill in the blank for 1 point; 5-10 points, 10 15 points for each question.Comprehensive base (computer network knowledge) question bank1.1 single option (1 point, 36 questions)1. The network using TCP/IP protocol is obtained through the logic and operation of IP address and netwo
4、rk shield code. Different subnet communication must be routed through routing. The meaning of subnet is ().A, suppression of possible broadcast storms in the network;B. Prevent hacking;C, facilitate the use of routers to make the network faster;D, convenient communication between Internet users;Corr
5、ect answer: A2. Normally, the SWITCH HUB we call works at the OSI model ()A. physical layerB. Data link layerC, session layerD. Transmission layerCorrect answer: B3. In the Windows 95/98 environment, the ping command is generally used to check whether the two hosts can intercommunicate at the IP lev
6、el. If defeated in A ping on B machine IP address, and there are multiple routers between machine A and machine B, then positioning between the machine A and machine B network in which problems on A router can use the following () command.A, tracertB, winipcfgC, netstat -rD, the routeCorrect answer:
7、 A4. Through standard network interface card directly connected with network card or the hub and must use a crossover cable, the cable RJ45 connectors on both ends of the center line sequence is not exactly the same, the difference is in the ().A, 1, 3, 2, 6 pairs of linesB, 1, 2 and 3, 6 pairs of l
8、inesC, 4, 5 and 7, 8 pair of line interchangeablyD, 4, 7 and 5, 8 pair of line interchangeablyCorrect answer: B5. The _ agreement enables the host and router to connect through the serial line.A, the PPPB, RIPC, ICMPD, RPVCorrect answer: AEvery router on the Internet maintains a network that describ
9、es the accessibility of the Internet ()A, class tableB, relational tableC. Routing tableD. Statistical tableCorrect answer: CThe () protocol parses the IP address to the MAC addressA, DNSB, DHCPC, ArpD, TCP/IPCorrect answer: C8. On the one hand, the firewall prevents unauthorized or unauthenticated
10、access to the protected network, and on the other hand allows users of internal networks to access the Internet or send and receive E-mail. (a)A. education networkB. Enterprise networkC. InternetD, campus networkCorrect answer: C9. The single broadcast routing protocol can be divided into intra-doma
11、in routing protocol IGP and extraterritorial routing protocol EGP. The following protocol is not IGP? (a)A, RIPB, IGRPC, is-isD, GPCorrect answer: D10. If a port belongs to multiple vlans then the connection to this port is called Trunk, and the following support Trunk is: ()A, 10M Ethernet portsB,
12、Catalyst, 1900C, IOS non-enterprise editionD, atalyst 2900/3500Correct answer: D11. The following statement about OSI is the wrong one ().A, organized by the International Standards Organization.B and the bottom two layers are the physical and data link layers.C, the data packaging (packet) is follo
13、wed by the network layer.E, the physical layer is responsible for data transmission.Correct answer: C12. The layer structure of WAN and LAN is represented by the upper and lower relationship of the seven-layer OSI model, and the WAN is lower in the model.And the LAN is lower.A, 2 (data)B, three laye
14、rs (network)C, four layersD, five layersThe correct answer: B, A13. Transmission rate unit BPS representative ().A, Bytes Per SecondB, Bits Per SecondC, Baud Per SecondD, Billion Per SecondCorrect answer: B14. Ethernet is based on the prototype of the network, and Ethernet is standard by IEEE.A, TDM
15、A control (TDMA)B, CMSA/CD media access controlC, token transfer controlD, IEEE802.1E, IEEE802.2F, EEE802.3The correct answer: B, F15. The address resolution protocol (ARP) is responsible for obtaining TCP/IP hosts on the broadcast network.A. IP addressB. hardware addressC, maskD, gatewayCorrect ans
16、wer: B16. Determine the appropriate subnet shield for the IP address range ( to 54). _A, B, C, D, 28Correct answer: C17. In the 10BASET network of RJ45 plug, the maximum length of a network segment is: ().A, 80 metersB, 100 -C,
17、185 mD, 500 -Correct answer: B18. In the seven layers of OSI, the protocol layer responsible for detecting the transmission of frames is: ()A, the physical layerB, network layerC, data link layerD. Transmission layerCorrect answer: C19. The following networking equipment works at the physical layer
18、of the OSI model ()A, routerB. ExchangeC, repeaterD, the bridgeCorrect answer: C20. The network of TCP/IP protocol is used to obtain the logic and operation of IP address and subnet mask, which must be routed through routing, and the meaning of subnet is ().A. prevent hacking;B. Suppression of possi
19、ble broadcast storms in the network;C, facilitate the use of routers, making the network faster;D. Convenient communication between Internet users.Correct answer: B21. Which of the following commands can be used to verify the entire TCP/IP stack? (a)A, the traceB, TelnetC, pingE, arpF, the stack - t
20、estCorrect answer: B22. The way OSPF routing updates are used is. (a)A, FloodingB, Step - by - StepC, all routers receive routing updates simultaneouslyD, Flash updatesCorrect answer: A23. What protocols and ports are used by BGP? (a)A, TCP port 169B, TCP port 179C, UDP port 169D, UDP port 79Correct
21、 answer: B24. The BGP routers are connected by. (a)A, TCP connectionB. Autonomous system numberC. Area codeD, group IDCorrect answer: A25. What is the base rate of the narrow-band ISDN ()?A, 64 kbit/sB, 14 kbit/sC, 128 kbit/sD, 384 kbit/sCorrect answer: AThe IP address in the public network is 129.9
22、.100.160 belongs to the () address.A. class AA class B addressClass C addressThe class D addressCorrect answer: B27. The address resolution protocol (ARP) is responsible for obtaining TCP/IP hosts on the broadcast network ().A. IP addressB. hardware addressC, maskD, gatewayCorrect answer: B28. The r
23、outing of datagram is () responsible.A, IPB, TCPC, UDPD, the PPPCorrect answer: A29. There are basically two types of firewalls: ().A physical layer and link layer.B link layer and network layerC network layer and application layerD otherCorrect answer: C30.After a user dial-up, you cant access any
24、domain name address, but can Ping their IP address. The () configuration of the PC should be checked.A, the gatewayB. Modem SettingsC, DHCP settingD, DNS configurationCorrect answer: D31. All users of a LAN can be connected to the Internet via a router. When a router dials the Internet through a MOD
25、EM, several IP addresses () are requested from the access server.1 A,B, 2,C, depending on the number of usersD, related to router configurationCorrect answer: A32. If two computers are to be connected directly through a double strand, the correct sequence is ().A, 1 - 1, 2 - 2, 3 - 3, 4 - 4, 5 - 5,
26、6 - 6, 7 - 7, 8 - 8B, 1 - 2, 2 - 1, 3 - 6, 4 - 4, 5 - 5, 6 - 3, 7 - 7, 8 - 8C, 1 - 3, 2 - 6, 3 - 1, 4 - 4, 5 - 5, 6 - 2, 7 - 7, 8 - 8D, two computers can not be connected directly by double stranded wiresCorrect answer: C33. The application Ping sends out the message.A, TCP requestTCP responseC, ICM
27、P requestD, ICMP responseCorrect answer: CThe _ protocol enables the host and the router to connect through the serial line.A, the PPPB, RIPC, ICMPD, ARPVCorrect answer: A35. Each router on the Internet maintains one () to describe the accessibility of the network.A, class tableB. Relational tableC.
28、 Routing tableD. Statistical tableCorrect answer: C36. For network addresses and masks , which of the following items can be provided? (a)A. 54B. 55C. 55D. 54Correct answer: D1.2 multiple choi
29、ces (2 on each question, 7)1. The advantages of segmenting LAN segments using layer 2 switches are the following ()A, reduce the size of the routing tableB, less conflictC, larger packet sizeD, each user gets more bandwidthCorrect answer: BDThere are three kinds of Ethernet. They are. (a)A, standard
30、 EthernetB, basic EthernetC, fast (100M) EthernetD, gigabit (1000M) EthernetThe correct answer: ACDThere are many types of lans, including:. (a)A, EthernetB. Packet switched networkC, token ring networkD, frame relay networkCorrect answer: ACAAA is short for. It is a client program running on the NA
31、S. It provides a consistent framework for configuring the three security functions of authentication, authorization, and billing. (a)A, distribution,B, validation,C, authorization,D, billingThe correct answer: BCD5. Frequently used tools in network fault location ()A, PINGB, TRACERT,C, NETSTATD, DOS
32、KEYCorrect answer: ABC6. What are the following commands for FTP? (a)A, binB, mgetC, byeD, CDThe correct answer: ABCD7. The following UDP protocol is based on ().A, RIPB, the RadiusC, TelnetD, FTPE, SNMPThe right answer: ABE8. The following protocols based on the TCP protocol are: ().A, RIPB, the Ra
33、diusC, TelnetD, FTPE, SNMPCorrect answer: CD1.3 judgment right and wrong (1 point, 10)1, routers in the network equipment in the transport layer of the OSI seven layer model, always maintains a routing table in the router, all packets sent between different networks and forwarded by the route table
34、lookup from the corresponding port, according to the table to produce the different way,We say that routers use routing policies for static routing and dynamic routing.A. rightB. errorsCorrect answer: B2, Ethernet access control method is used for CSMA/CD, the use of transmission lines follow 10 bas
35、e2, 10 base5, 10 baset design rule, which requires the use of the rules of unshielded twisted pair is 10 base2, it requires the host to the HUB distance of 100 meters.A. rightB. errorsCorrect answer: B3. The IP address of A machine is 9 and the mask code is 52. The network ad
36、dress of the IP subnet of A machine is 8 and the broadcast address is 1.A. rightB. errorsCorrect answer: AGenerally speaking, only one IP address can be assigned to a router, and only one addressable route record is allowed in its routing table.A. rightB. errorsCorrect answer:
37、B5. In the TCP/IP protocol, IP addresses are used to represent only one communication port; And the network mask is used to divide the network segments. If the IP address of a host in the network is 8 and the network mask is 92, the network address of the host network is 20
38、4 and the broadcast address is 27.A. rightB. errorsCorrect answer: AThe global Internet is very complex and error-prone, and therefore USES connection-oriented protocols.A. rightB. errorsCorrect answer: AThe PPP does not support automatic IP addressing, and SLIP is supported.
39、A. rightB. errorsCorrect answer: B8. NetBEUI has dynamic features, so it cant perform its best performance when used in most non-routing lans.A. rightB. errorsCorrect answer: B9. FTP protocol is a file transfer protocol for transmission (upload, download) files over the INTERNET.A. rightB. errorsCor
40、rect answer: A10. The transmission rate is 64K, which represents the transmission of 8K bytes per second.A. rightB. errorsCorrect answer: A1. Fill in the blanks (1 point, 22)1. When LANRover and DDN network, the local party shall provide _DTU_ equipment, communication mode _ asynchronous _.2. The ne
41、twork address mask used in a TCP/IP network is 52. The IP address of a host in this network is 0, and the network address of the subnet is , and the broadcast address is 1.3, on the one hand, prevent from the Internet to the protected network firewall unauthor
42、ized access or validation, on the other hand allows internal network users on the Internet Web access or send and receive E-mail, etc.4. AAA is short for verification, authorization and accounting. It is a client program running on the NAS. It provides a consistent framework for configuring the thre
43、e security functions of authentication, authorization, and billing.5. The maximum network number of class A IP address is _126_, with the maximum number of hosts: _16777214_; The maximum network number of class B IP addresses is _16384_, and the maximum number of hosts is: _65534_; The maximum netwo
44、rk number of class C IP address is _2097152_, and the maximum number of hosts is: _254_.6. Using TCP/IP protocol communication, IP address, subnet shield code and default gateway must be configured.7. Used to test whether the two host configurations and IP connections between the two are normal. The
45、 _PING_ command is available.8. Address resolution protocol ARP is to map the IP address of the host to _ hardware (MAC) address _.9. In class B addresses, if 8 bits are used as a subnet, there are _254_ subnet, and each subnet can have _254_ host.10. TCP/IP stipulates that all members of the host n
46、umber are the 1 net addresses used in _ broadcast address _.11. TCP/IP protocol specifies that groups with network number _127_ cannot appear on any network, and hosts and gateways cannot broadcast any finding information for that address.12. In the TCP/IP network, the common network topology types include star type, total line, ring type and tree type.13. Explain the service content provided by the following services:WINS service: WINDOWS name resolution, which provides t
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025北京房屋個(gè)人租賃合同
- 2025版高速公路橋梁建設(shè)工程施工合同復(fù)雜條款詳述2篇
- 室內(nèi)裝修合同常用版范本
- 正規(guī)醫(yī)學(xué)生的實(shí)習(xí)合同5篇
- 2025年度文化旅游貸款合同
- 二零二五年度診所護(hù)士規(guī)范化培訓(xùn)及聘用合同
- 2025年度離職員工離職時(shí)簽訂的保密及競業(yè)禁止合同
- 2025年度股權(quán)眾籌項(xiàng)目分配與管理合同
- 二零二五年度藝人經(jīng)紀(jì)合作協(xié)議-經(jīng)紀(jì)公司專業(yè)代理合同
- 2025年度股權(quán)激勵(lì)與分紅權(quán)結(jié)合合同版
- 2025理論學(xué)習(xí)計(jì)劃2025年理論中心組學(xué)習(xí)計(jì)劃
- 2025年醫(yī)美醫(yī)院公司組織架構(gòu)和業(yè)務(wù)流程
- 山西省2024年中考物理試題(含答案)
- 春節(jié)節(jié)后收心安全培訓(xùn)
- 高中物理斜面模型大全(80個(gè))
- 2025年高考物理復(fù)習(xí)壓軸題:電磁感應(yīng)綜合問題(解析版)
- 2024-2030年芯片行業(yè)市場發(fā)展分析及發(fā)展趨勢(shì)前景預(yù)測(cè)報(bào)告
- 2024年個(gè)人車位租賃合同經(jīng)典版(二篇)
- 2024-2030年中國汽車駕駛培訓(xùn)市場發(fā)展動(dòng)態(tài)與前景趨勢(shì)預(yù)測(cè)報(bào)告
- 中鐵十四局合同范本
- 浙教版七年級(jí)數(shù)學(xué)下冊(cè)單元測(cè)試題及參考答案
評(píng)論
0/150
提交評(píng)論