計算機網絡基礎(Computer network foundation)_第1頁
計算機網絡基礎(Computer network foundation)_第2頁
計算機網絡基礎(Computer network foundation)_第3頁
計算機網絡基礎(Computer network foundation)_第4頁
計算機網絡基礎(Computer network foundation)_第5頁
已閱讀5頁,還剩23頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

1、計算機網絡基礎(Computer network foundation)Comprehensive base (computer network knowledge) question bank(total 75)Comprehensive base (computer network knowledge) question bank 21.1 single option (1 point, 36 questions) 21.2 multiple choices (2 points, 7 questions) 101.3 judgment right and wrong (1 point, 1

2、0 questions) 12Fill in the blanks (1 point each time, 22) 131.5 short answer (0 question) 15Description:The forms of the test include: single election, multiple choice, judgment, fill blank, brief description and discussion, and give the score and answer to each track.Score standard: 1. Choose 2 poi

3、nts for each item; Fill in the blank for 1 point; 5-10 points, 10 15 points for each question.Comprehensive base (computer network knowledge) question bank1.1 single option (1 point, 36 questions)1. The network using TCP/IP protocol is obtained through the logic and operation of IP address and netwo

4、rk shield code. Different subnet communication must be routed through routing. The meaning of subnet is ().A, suppression of possible broadcast storms in the network;B. Prevent hacking;C, facilitate the use of routers to make the network faster;D, convenient communication between Internet users;Corr

5、ect answer: A2. Normally, the SWITCH HUB we call works at the OSI model ()A. physical layerB. Data link layerC, session layerD. Transmission layerCorrect answer: B3. In the Windows 95/98 environment, the ping command is generally used to check whether the two hosts can intercommunicate at the IP lev

6、el. If defeated in A ping on B machine IP address, and there are multiple routers between machine A and machine B, then positioning between the machine A and machine B network in which problems on A router can use the following () command.A, tracertB, winipcfgC, netstat -rD, the routeCorrect answer:

7、 A4. Through standard network interface card directly connected with network card or the hub and must use a crossover cable, the cable RJ45 connectors on both ends of the center line sequence is not exactly the same, the difference is in the ().A, 1, 3, 2, 6 pairs of linesB, 1, 2 and 3, 6 pairs of l

8、inesC, 4, 5 and 7, 8 pair of line interchangeablyD, 4, 7 and 5, 8 pair of line interchangeablyCorrect answer: B5. The _ agreement enables the host and router to connect through the serial line.A, the PPPB, RIPC, ICMPD, RPVCorrect answer: AEvery router on the Internet maintains a network that describ

9、es the accessibility of the Internet ()A, class tableB, relational tableC. Routing tableD. Statistical tableCorrect answer: CThe () protocol parses the IP address to the MAC addressA, DNSB, DHCPC, ArpD, TCP/IPCorrect answer: C8. On the one hand, the firewall prevents unauthorized or unauthenticated

10、access to the protected network, and on the other hand allows users of internal networks to access the Internet or send and receive E-mail. (a)A. education networkB. Enterprise networkC. InternetD, campus networkCorrect answer: C9. The single broadcast routing protocol can be divided into intra-doma

11、in routing protocol IGP and extraterritorial routing protocol EGP. The following protocol is not IGP? (a)A, RIPB, IGRPC, is-isD, GPCorrect answer: D10. If a port belongs to multiple vlans then the connection to this port is called Trunk, and the following support Trunk is: ()A, 10M Ethernet portsB,

12、Catalyst, 1900C, IOS non-enterprise editionD, atalyst 2900/3500Correct answer: D11. The following statement about OSI is the wrong one ().A, organized by the International Standards Organization.B and the bottom two layers are the physical and data link layers.C, the data packaging (packet) is follo

13、wed by the network layer.E, the physical layer is responsible for data transmission.Correct answer: C12. The layer structure of WAN and LAN is represented by the upper and lower relationship of the seven-layer OSI model, and the WAN is lower in the model.And the LAN is lower.A, 2 (data)B, three laye

14、rs (network)C, four layersD, five layersThe correct answer: B, A13. Transmission rate unit BPS representative ().A, Bytes Per SecondB, Bits Per SecondC, Baud Per SecondD, Billion Per SecondCorrect answer: B14. Ethernet is based on the prototype of the network, and Ethernet is standard by IEEE.A, TDM

15、A control (TDMA)B, CMSA/CD media access controlC, token transfer controlD, IEEE802.1E, IEEE802.2F, EEE802.3The correct answer: B, F15. The address resolution protocol (ARP) is responsible for obtaining TCP/IP hosts on the broadcast network.A. IP addressB. hardware addressC, maskD, gatewayCorrect ans

16、wer: B16. Determine the appropriate subnet shield for the IP address range ( to 54). _A, B, C, D, 28Correct answer: C17. In the 10BASET network of RJ45 plug, the maximum length of a network segment is: ().A, 80 metersB, 100 -C,

17、185 mD, 500 -Correct answer: B18. In the seven layers of OSI, the protocol layer responsible for detecting the transmission of frames is: ()A, the physical layerB, network layerC, data link layerD. Transmission layerCorrect answer: C19. The following networking equipment works at the physical layer

18、of the OSI model ()A, routerB. ExchangeC, repeaterD, the bridgeCorrect answer: C20. The network of TCP/IP protocol is used to obtain the logic and operation of IP address and subnet mask, which must be routed through routing, and the meaning of subnet is ().A. prevent hacking;B. Suppression of possi

19、ble broadcast storms in the network;C, facilitate the use of routers, making the network faster;D. Convenient communication between Internet users.Correct answer: B21. Which of the following commands can be used to verify the entire TCP/IP stack? (a)A, the traceB, TelnetC, pingE, arpF, the stack - t

20、estCorrect answer: B22. The way OSPF routing updates are used is. (a)A, FloodingB, Step - by - StepC, all routers receive routing updates simultaneouslyD, Flash updatesCorrect answer: A23. What protocols and ports are used by BGP? (a)A, TCP port 169B, TCP port 179C, UDP port 169D, UDP port 79Correct

21、 answer: B24. The BGP routers are connected by. (a)A, TCP connectionB. Autonomous system numberC. Area codeD, group IDCorrect answer: A25. What is the base rate of the narrow-band ISDN ()?A, 64 kbit/sB, 14 kbit/sC, 128 kbit/sD, 384 kbit/sCorrect answer: AThe IP address in the public network is 129.9

22、.100.160 belongs to the () address.A. class AA class B addressClass C addressThe class D addressCorrect answer: B27. The address resolution protocol (ARP) is responsible for obtaining TCP/IP hosts on the broadcast network ().A. IP addressB. hardware addressC, maskD, gatewayCorrect answer: B28. The r

23、outing of datagram is () responsible.A, IPB, TCPC, UDPD, the PPPCorrect answer: A29. There are basically two types of firewalls: ().A physical layer and link layer.B link layer and network layerC network layer and application layerD otherCorrect answer: C30.After a user dial-up, you cant access any

24、domain name address, but can Ping their IP address. The () configuration of the PC should be checked.A, the gatewayB. Modem SettingsC, DHCP settingD, DNS configurationCorrect answer: D31. All users of a LAN can be connected to the Internet via a router. When a router dials the Internet through a MOD

25、EM, several IP addresses () are requested from the access server.1 A,B, 2,C, depending on the number of usersD, related to router configurationCorrect answer: A32. If two computers are to be connected directly through a double strand, the correct sequence is ().A, 1 - 1, 2 - 2, 3 - 3, 4 - 4, 5 - 5,

26、6 - 6, 7 - 7, 8 - 8B, 1 - 2, 2 - 1, 3 - 6, 4 - 4, 5 - 5, 6 - 3, 7 - 7, 8 - 8C, 1 - 3, 2 - 6, 3 - 1, 4 - 4, 5 - 5, 6 - 2, 7 - 7, 8 - 8D, two computers can not be connected directly by double stranded wiresCorrect answer: C33. The application Ping sends out the message.A, TCP requestTCP responseC, ICM

27、P requestD, ICMP responseCorrect answer: CThe _ protocol enables the host and the router to connect through the serial line.A, the PPPB, RIPC, ICMPD, ARPVCorrect answer: A35. Each router on the Internet maintains one () to describe the accessibility of the network.A, class tableB. Relational tableC.

28、 Routing tableD. Statistical tableCorrect answer: C36. For network addresses and masks , which of the following items can be provided? (a)A. 54B. 55C. 55D. 54Correct answer: D1.2 multiple choi

29、ces (2 on each question, 7)1. The advantages of segmenting LAN segments using layer 2 switches are the following ()A, reduce the size of the routing tableB, less conflictC, larger packet sizeD, each user gets more bandwidthCorrect answer: BDThere are three kinds of Ethernet. They are. (a)A, standard

30、 EthernetB, basic EthernetC, fast (100M) EthernetD, gigabit (1000M) EthernetThe correct answer: ACDThere are many types of lans, including:. (a)A, EthernetB. Packet switched networkC, token ring networkD, frame relay networkCorrect answer: ACAAA is short for. It is a client program running on the NA

31、S. It provides a consistent framework for configuring the three security functions of authentication, authorization, and billing. (a)A, distribution,B, validation,C, authorization,D, billingThe correct answer: BCD5. Frequently used tools in network fault location ()A, PINGB, TRACERT,C, NETSTATD, DOS

32、KEYCorrect answer: ABC6. What are the following commands for FTP? (a)A, binB, mgetC, byeD, CDThe correct answer: ABCD7. The following UDP protocol is based on ().A, RIPB, the RadiusC, TelnetD, FTPE, SNMPThe right answer: ABE8. The following protocols based on the TCP protocol are: ().A, RIPB, the Ra

33、diusC, TelnetD, FTPE, SNMPCorrect answer: CD1.3 judgment right and wrong (1 point, 10)1, routers in the network equipment in the transport layer of the OSI seven layer model, always maintains a routing table in the router, all packets sent between different networks and forwarded by the route table

34、lookup from the corresponding port, according to the table to produce the different way,We say that routers use routing policies for static routing and dynamic routing.A. rightB. errorsCorrect answer: B2, Ethernet access control method is used for CSMA/CD, the use of transmission lines follow 10 bas

35、e2, 10 base5, 10 baset design rule, which requires the use of the rules of unshielded twisted pair is 10 base2, it requires the host to the HUB distance of 100 meters.A. rightB. errorsCorrect answer: B3. The IP address of A machine is 9 and the mask code is 52. The network ad

36、dress of the IP subnet of A machine is 8 and the broadcast address is 1.A. rightB. errorsCorrect answer: AGenerally speaking, only one IP address can be assigned to a router, and only one addressable route record is allowed in its routing table.A. rightB. errorsCorrect answer:

37、B5. In the TCP/IP protocol, IP addresses are used to represent only one communication port; And the network mask is used to divide the network segments. If the IP address of a host in the network is 8 and the network mask is 92, the network address of the host network is 20

38、4 and the broadcast address is 27.A. rightB. errorsCorrect answer: AThe global Internet is very complex and error-prone, and therefore USES connection-oriented protocols.A. rightB. errorsCorrect answer: AThe PPP does not support automatic IP addressing, and SLIP is supported.

39、A. rightB. errorsCorrect answer: B8. NetBEUI has dynamic features, so it cant perform its best performance when used in most non-routing lans.A. rightB. errorsCorrect answer: B9. FTP protocol is a file transfer protocol for transmission (upload, download) files over the INTERNET.A. rightB. errorsCor

40、rect answer: A10. The transmission rate is 64K, which represents the transmission of 8K bytes per second.A. rightB. errorsCorrect answer: A1. Fill in the blanks (1 point, 22)1. When LANRover and DDN network, the local party shall provide _DTU_ equipment, communication mode _ asynchronous _.2. The ne

41、twork address mask used in a TCP/IP network is 52. The IP address of a host in this network is 0, and the network address of the subnet is , and the broadcast address is 1.3, on the one hand, prevent from the Internet to the protected network firewall unauthor

42、ized access or validation, on the other hand allows internal network users on the Internet Web access or send and receive E-mail, etc.4. AAA is short for verification, authorization and accounting. It is a client program running on the NAS. It provides a consistent framework for configuring the thre

43、e security functions of authentication, authorization, and billing.5. The maximum network number of class A IP address is _126_, with the maximum number of hosts: _16777214_; The maximum network number of class B IP addresses is _16384_, and the maximum number of hosts is: _65534_; The maximum netwo

44、rk number of class C IP address is _2097152_, and the maximum number of hosts is: _254_.6. Using TCP/IP protocol communication, IP address, subnet shield code and default gateway must be configured.7. Used to test whether the two host configurations and IP connections between the two are normal. The

45、 _PING_ command is available.8. Address resolution protocol ARP is to map the IP address of the host to _ hardware (MAC) address _.9. In class B addresses, if 8 bits are used as a subnet, there are _254_ subnet, and each subnet can have _254_ host.10. TCP/IP stipulates that all members of the host n

46、umber are the 1 net addresses used in _ broadcast address _.11. TCP/IP protocol specifies that groups with network number _127_ cannot appear on any network, and hosts and gateways cannot broadcast any finding information for that address.12. In the TCP/IP network, the common network topology types include star type, total line, ring type and tree type.13. Explain the service content provided by the following services:WINS service: WINDOWS name resolution, which provides t

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論