版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、計算機網絡基礎(Computer network foundation)Comprehensive base (computer network knowledge) question bank(total 75)Comprehensive base (computer network knowledge) question bank 21.1 single option (1 point, 36 questions) 21.2 multiple choices (2 points, 7 questions) 101.3 judgment right and wrong (1 point, 1
2、0 questions) 12Fill in the blanks (1 point each time, 22) 131.5 short answer (0 question) 15Description:The forms of the test include: single election, multiple choice, judgment, fill blank, brief description and discussion, and give the score and answer to each track.Score standard: 1. Choose 2 poi
3、nts for each item; Fill in the blank for 1 point; 5-10 points, 10 15 points for each question.Comprehensive base (computer network knowledge) question bank1.1 single option (1 point, 36 questions)1. The network using TCP/IP protocol is obtained through the logic and operation of IP address and netwo
4、rk shield code. Different subnet communication must be routed through routing. The meaning of subnet is ().A, suppression of possible broadcast storms in the network;B. Prevent hacking;C, facilitate the use of routers to make the network faster;D, convenient communication between Internet users;Corr
5、ect answer: A2. Normally, the SWITCH HUB we call works at the OSI model ()A. physical layerB. Data link layerC, session layerD. Transmission layerCorrect answer: B3. In the Windows 95/98 environment, the ping command is generally used to check whether the two hosts can intercommunicate at the IP lev
6、el. If defeated in A ping on B machine IP address, and there are multiple routers between machine A and machine B, then positioning between the machine A and machine B network in which problems on A router can use the following () command.A, tracertB, winipcfgC, netstat -rD, the routeCorrect answer:
7、 A4. Through standard network interface card directly connected with network card or the hub and must use a crossover cable, the cable RJ45 connectors on both ends of the center line sequence is not exactly the same, the difference is in the ().A, 1, 3, 2, 6 pairs of linesB, 1, 2 and 3, 6 pairs of l
8、inesC, 4, 5 and 7, 8 pair of line interchangeablyD, 4, 7 and 5, 8 pair of line interchangeablyCorrect answer: B5. The _ agreement enables the host and router to connect through the serial line.A, the PPPB, RIPC, ICMPD, RPVCorrect answer: AEvery router on the Internet maintains a network that describ
9、es the accessibility of the Internet ()A, class tableB, relational tableC. Routing tableD. Statistical tableCorrect answer: CThe () protocol parses the IP address to the MAC addressA, DNSB, DHCPC, ArpD, TCP/IPCorrect answer: C8. On the one hand, the firewall prevents unauthorized or unauthenticated
10、access to the protected network, and on the other hand allows users of internal networks to access the Internet or send and receive E-mail. (a)A. education networkB. Enterprise networkC. InternetD, campus networkCorrect answer: C9. The single broadcast routing protocol can be divided into intra-doma
11、in routing protocol IGP and extraterritorial routing protocol EGP. The following protocol is not IGP? (a)A, RIPB, IGRPC, is-isD, GPCorrect answer: D10. If a port belongs to multiple vlans then the connection to this port is called Trunk, and the following support Trunk is: ()A, 10M Ethernet portsB,
12、Catalyst, 1900C, IOS non-enterprise editionD, atalyst 2900/3500Correct answer: D11. The following statement about OSI is the wrong one ().A, organized by the International Standards Organization.B and the bottom two layers are the physical and data link layers.C, the data packaging (packet) is follo
13、wed by the network layer.E, the physical layer is responsible for data transmission.Correct answer: C12. The layer structure of WAN and LAN is represented by the upper and lower relationship of the seven-layer OSI model, and the WAN is lower in the model.And the LAN is lower.A, 2 (data)B, three laye
14、rs (network)C, four layersD, five layersThe correct answer: B, A13. Transmission rate unit BPS representative ().A, Bytes Per SecondB, Bits Per SecondC, Baud Per SecondD, Billion Per SecondCorrect answer: B14. Ethernet is based on the prototype of the network, and Ethernet is standard by IEEE.A, TDM
15、A control (TDMA)B, CMSA/CD media access controlC, token transfer controlD, IEEE802.1E, IEEE802.2F, EEE802.3The correct answer: B, F15. The address resolution protocol (ARP) is responsible for obtaining TCP/IP hosts on the broadcast network.A. IP addressB. hardware addressC, maskD, gatewayCorrect ans
16、wer: B16. Determine the appropriate subnet shield for the IP address range ( to 54). _A, B, C, D, 28Correct answer: C17. In the 10BASET network of RJ45 plug, the maximum length of a network segment is: ().A, 80 metersB, 100 -C,
17、185 mD, 500 -Correct answer: B18. In the seven layers of OSI, the protocol layer responsible for detecting the transmission of frames is: ()A, the physical layerB, network layerC, data link layerD. Transmission layerCorrect answer: C19. The following networking equipment works at the physical layer
18、of the OSI model ()A, routerB. ExchangeC, repeaterD, the bridgeCorrect answer: C20. The network of TCP/IP protocol is used to obtain the logic and operation of IP address and subnet mask, which must be routed through routing, and the meaning of subnet is ().A. prevent hacking;B. Suppression of possi
19、ble broadcast storms in the network;C, facilitate the use of routers, making the network faster;D. Convenient communication between Internet users.Correct answer: B21. Which of the following commands can be used to verify the entire TCP/IP stack? (a)A, the traceB, TelnetC, pingE, arpF, the stack - t
20、estCorrect answer: B22. The way OSPF routing updates are used is. (a)A, FloodingB, Step - by - StepC, all routers receive routing updates simultaneouslyD, Flash updatesCorrect answer: A23. What protocols and ports are used by BGP? (a)A, TCP port 169B, TCP port 179C, UDP port 169D, UDP port 79Correct
21、 answer: B24. The BGP routers are connected by. (a)A, TCP connectionB. Autonomous system numberC. Area codeD, group IDCorrect answer: A25. What is the base rate of the narrow-band ISDN ()?A, 64 kbit/sB, 14 kbit/sC, 128 kbit/sD, 384 kbit/sCorrect answer: AThe IP address in the public network is 129.9
22、.100.160 belongs to the () address.A. class AA class B addressClass C addressThe class D addressCorrect answer: B27. The address resolution protocol (ARP) is responsible for obtaining TCP/IP hosts on the broadcast network ().A. IP addressB. hardware addressC, maskD, gatewayCorrect answer: B28. The r
23、outing of datagram is () responsible.A, IPB, TCPC, UDPD, the PPPCorrect answer: A29. There are basically two types of firewalls: ().A physical layer and link layer.B link layer and network layerC network layer and application layerD otherCorrect answer: C30.After a user dial-up, you cant access any
24、domain name address, but can Ping their IP address. The () configuration of the PC should be checked.A, the gatewayB. Modem SettingsC, DHCP settingD, DNS configurationCorrect answer: D31. All users of a LAN can be connected to the Internet via a router. When a router dials the Internet through a MOD
25、EM, several IP addresses () are requested from the access server.1 A,B, 2,C, depending on the number of usersD, related to router configurationCorrect answer: A32. If two computers are to be connected directly through a double strand, the correct sequence is ().A, 1 - 1, 2 - 2, 3 - 3, 4 - 4, 5 - 5,
26、6 - 6, 7 - 7, 8 - 8B, 1 - 2, 2 - 1, 3 - 6, 4 - 4, 5 - 5, 6 - 3, 7 - 7, 8 - 8C, 1 - 3, 2 - 6, 3 - 1, 4 - 4, 5 - 5, 6 - 2, 7 - 7, 8 - 8D, two computers can not be connected directly by double stranded wiresCorrect answer: C33. The application Ping sends out the message.A, TCP requestTCP responseC, ICM
27、P requestD, ICMP responseCorrect answer: CThe _ protocol enables the host and the router to connect through the serial line.A, the PPPB, RIPC, ICMPD, ARPVCorrect answer: A35. Each router on the Internet maintains one () to describe the accessibility of the network.A, class tableB. Relational tableC.
28、 Routing tableD. Statistical tableCorrect answer: C36. For network addresses and masks , which of the following items can be provided? (a)A. 54B. 55C. 55D. 54Correct answer: D1.2 multiple choi
29、ces (2 on each question, 7)1. The advantages of segmenting LAN segments using layer 2 switches are the following ()A, reduce the size of the routing tableB, less conflictC, larger packet sizeD, each user gets more bandwidthCorrect answer: BDThere are three kinds of Ethernet. They are. (a)A, standard
30、 EthernetB, basic EthernetC, fast (100M) EthernetD, gigabit (1000M) EthernetThe correct answer: ACDThere are many types of lans, including:. (a)A, EthernetB. Packet switched networkC, token ring networkD, frame relay networkCorrect answer: ACAAA is short for. It is a client program running on the NA
31、S. It provides a consistent framework for configuring the three security functions of authentication, authorization, and billing. (a)A, distribution,B, validation,C, authorization,D, billingThe correct answer: BCD5. Frequently used tools in network fault location ()A, PINGB, TRACERT,C, NETSTATD, DOS
32、KEYCorrect answer: ABC6. What are the following commands for FTP? (a)A, binB, mgetC, byeD, CDThe correct answer: ABCD7. The following UDP protocol is based on ().A, RIPB, the RadiusC, TelnetD, FTPE, SNMPThe right answer: ABE8. The following protocols based on the TCP protocol are: ().A, RIPB, the Ra
33、diusC, TelnetD, FTPE, SNMPCorrect answer: CD1.3 judgment right and wrong (1 point, 10)1, routers in the network equipment in the transport layer of the OSI seven layer model, always maintains a routing table in the router, all packets sent between different networks and forwarded by the route table
34、lookup from the corresponding port, according to the table to produce the different way,We say that routers use routing policies for static routing and dynamic routing.A. rightB. errorsCorrect answer: B2, Ethernet access control method is used for CSMA/CD, the use of transmission lines follow 10 bas
35、e2, 10 base5, 10 baset design rule, which requires the use of the rules of unshielded twisted pair is 10 base2, it requires the host to the HUB distance of 100 meters.A. rightB. errorsCorrect answer: B3. The IP address of A machine is 9 and the mask code is 52. The network ad
36、dress of the IP subnet of A machine is 8 and the broadcast address is 1.A. rightB. errorsCorrect answer: AGenerally speaking, only one IP address can be assigned to a router, and only one addressable route record is allowed in its routing table.A. rightB. errorsCorrect answer:
37、B5. In the TCP/IP protocol, IP addresses are used to represent only one communication port; And the network mask is used to divide the network segments. If the IP address of a host in the network is 8 and the network mask is 92, the network address of the host network is 20
38、4 and the broadcast address is 27.A. rightB. errorsCorrect answer: AThe global Internet is very complex and error-prone, and therefore USES connection-oriented protocols.A. rightB. errorsCorrect answer: AThe PPP does not support automatic IP addressing, and SLIP is supported.
39、A. rightB. errorsCorrect answer: B8. NetBEUI has dynamic features, so it cant perform its best performance when used in most non-routing lans.A. rightB. errorsCorrect answer: B9. FTP protocol is a file transfer protocol for transmission (upload, download) files over the INTERNET.A. rightB. errorsCor
40、rect answer: A10. The transmission rate is 64K, which represents the transmission of 8K bytes per second.A. rightB. errorsCorrect answer: A1. Fill in the blanks (1 point, 22)1. When LANRover and DDN network, the local party shall provide _DTU_ equipment, communication mode _ asynchronous _.2. The ne
41、twork address mask used in a TCP/IP network is 52. The IP address of a host in this network is 0, and the network address of the subnet is , and the broadcast address is 1.3, on the one hand, prevent from the Internet to the protected network firewall unauthor
42、ized access or validation, on the other hand allows internal network users on the Internet Web access or send and receive E-mail, etc.4. AAA is short for verification, authorization and accounting. It is a client program running on the NAS. It provides a consistent framework for configuring the thre
43、e security functions of authentication, authorization, and billing.5. The maximum network number of class A IP address is _126_, with the maximum number of hosts: _16777214_; The maximum network number of class B IP addresses is _16384_, and the maximum number of hosts is: _65534_; The maximum netwo
44、rk number of class C IP address is _2097152_, and the maximum number of hosts is: _254_.6. Using TCP/IP protocol communication, IP address, subnet shield code and default gateway must be configured.7. Used to test whether the two host configurations and IP connections between the two are normal. The
45、 _PING_ command is available.8. Address resolution protocol ARP is to map the IP address of the host to _ hardware (MAC) address _.9. In class B addresses, if 8 bits are used as a subnet, there are _254_ subnet, and each subnet can have _254_ host.10. TCP/IP stipulates that all members of the host n
46、umber are the 1 net addresses used in _ broadcast address _.11. TCP/IP protocol specifies that groups with network number _127_ cannot appear on any network, and hosts and gateways cannot broadcast any finding information for that address.12. In the TCP/IP network, the common network topology types include star type, total line, ring type and tree type.13. Explain the service content provided by the following services:WINS service: WINDOWS name resolution, which provides t
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年度個人房地產抵押借款合同智能審核版
- 2025年度個人車庫買賣與車位使用權過戶合同2篇
- 二零二五年度模板木枋行業(yè)節(jié)能減排合作合同4篇
- 二零二五年度新型環(huán)保涂料研發(fā)與應用推廣合同3篇
- 2025年度模具制造企業(yè)兼職用工合同范本3篇
- 二零二五年度海洋資源開發(fā)合作合同范本共3篇
- 2025年度離婚訴訟訴狀撰寫規(guī)范解讀4篇
- 2025年度個人二手房交易合同范本(含裝修款及違約責任)
- 2025年度農業(yè)科技園區(qū)配套設施建設合同4篇
- 二零二五年度農業(yè)科技培訓與推廣合同8篇
- 七年級下冊-備戰(zhàn)2024年中考歷史總復習核心考點與重難點練習(統部編版)
- 2024年佛山市勞動合同條例
- 污水管網規(guī)劃建設方案
- 城鎮(zhèn)智慧排水系統技術標準
- 采購管理制度及流程采購管理制度及流程
- 新修訂藥品GMP中藥飲片附錄解讀課件
- 五年級美術下冊第9課《寫意蔬果》-優(yōu)秀課件4人教版
- 節(jié)能降耗課件
- 尼爾森數據市場分析報告
- 氧氣霧化吸入法
- 領導干部個人有關事項報告表(模板)
評論
0/150
提交評論