100 + simple network basics (answer)

Source: Internet
Author: User
Tags squid proxy

1. Statement of "conflict detection problem in the Token Ring" (B)
A. Correct B. Incorrect
2. What is the network cable connector type used for connecting a PC to a hub in the network? A
A.RJ-45 B .RJ-11
3.100what is the meaning of "base" in Baset? B
A. Basic transmission B. baseband transmission
4. Which of the following network types is suitable for centralized network management? B
A. Peer-to-Peer B. Client/Server
5. Which of the following does OSPF belong?

Type protocol? A
A. Internal Routing Protocol B. External Routing Protocol
6. Which of the following protocols does BGP belong? B
A. Internal Routing Protocol B. External Routing Protocol
7. arp request packets belong ______. A
A. unicast B. Broadcast
8. Which of the following commands is used to view the port in use in Linux? B
A. ifconfig-a B. netstat-
C. netstat-Rn
9. The four important protocols used by the Internet network layer are () B
A. IP, ICMP, ARP, udp B. IP, ICMP, ARP, RARP
C. TCP, UDP, ARP, RARP
10. Which of the following network technologies is used in Ethernet? C
A. fddi B. ATM
C. CSMA/CD
11. What layer does the HDLC protocol work on in the OSI model? C
A. Transport Layer B. Network Layer
C. Data Link Layer
12. Which of the following commands is used to save the current configuration of the vro to the TFTP server? C
A. Router # copy startup-config tftp B. Router # copy flash TFTP
C. Router # copy running-config TFTP
13. Which of the following statements about Mac is wrong _______. A
A. Each time the MAC address is started, it will change B. the MAC address has a total of 48 bits, and they are solidified in the NIC from the factory.
C. MAC addresses are also called physical addresses, or hardware addresses of computers.
14. What are the core IP protocol problems _______? B
A. Transfer B. Route finding
C. Encapsulation
15. In Linux, which of the following commands can be used to view which RPM package is used to install the/etc/Foo file? D
A. rpm-Qa | grep Foo B. rpm-QL/etc/foo
C. rpm-qlf/etc/Foo D. rpm-Q-F/etc/foo
16. Data Compression is closely related to the () layer in the OSI model D.
A. Presentation Layer B. Data Link Layer
C. Physical Layer D. Transport Layer
17. Which of the following functions does a vswitch have? C
A. Forwarding filtering B. Loop avoidance
C. route forwarding D. Address Learning
18. Which of the following protocols is used in a wireless lan _____. A
A.802.3 B .802.5
C.802.7 d.802.11
19. Which of the following CIDR blocks does not belong to private addresses ________. D
A.10.0.0.0/8 B .172.16.0.0/12
C.192.168.0.0/16 d.224.0.0.0/8
20. Which of the following servers belongs to the Web server? C
A. Bind B. Squid
C. Apache D. Samba
21. ping commands in Windows and Linux have the same functions.
A. Yes B. No
22. What is the default port B of the Squid proxy server?
A.8080 B .3128
23. The IEEE802 standard divides the data link layer into two sub-layers A: LLC and Mac.
A. Correct B. Incorrect
24. The User Datagram Protocol (UDP) is the _____ transport layer protocol. B
A. connection-oriented B. connectionless
25. The following command is used to count the lines of the string "Linux" in the text file ABC: B
A. "cat ABC | find" "Linux" | WC-L "B." cat ABC | grep "" Linux "" | WC"
C. "cat ABC | grep" "Linux" "| WC-l"
26. The following () is the software B used to implement proxy server in Linux.
A. Isa B. Squid
C. Sygate
27. Two different types of computer networks can communicate with each other because ()
A. They all comply with the OSI model B. They all use TCP/IP
C. They all use compatible protocol groups.
28. Which of the following network devices is used to isolate broadcast? C
A. Hub B. vswitch
C. Router
29. What is the concole cable type used to configure a vswitch or vro? A
A. pass-through cable B. Cross Cable
C. Reverse line
30. Which of the following modes can be used for interface configuration on the vro? B
A. User Mode B. Privileged Mode
C. Global Configuration Mode
31. Frame Relay achieves link multiplexing and forwarding in () B
A. Physical Layer B. Link Layer
C. Network Layer D. Transport Layer
32. Data Compression is closely related to the () layer in the OSI model D.
A. Presentation Layer B. Data Link Layer
C. Physical Layer D. Transport Layer
33. Which of the following TCP ports is used for SSL (Secure Socket Layer) communication? C
A.110 B .1433
C.443 d.520
34. Which of the following does not belong to function B of the AAA Server?
A. Authentication B. Management
C. Authorize D. Billing
35. The physical layer function of ATM is equivalent to () B in OSI/RM.
A. data link layer and network layer B. Physical Layer and data link layer
36. What is the common cable standard in network engineering? B
A.568a B .568b
What is the meaning of "base" in 37.100baset? B
A. Basic transmission B. baseband transmission
38. arp request packets belong ______. A
A. unicast B. Broadcast
39. There are three important clocks in RIP. The clock with invalid routes is generally set to () B.
A.30 seconds B .90 seconds
C.270 seconds
40. TCP communication is established on the basis of the connection, and the establishment of the TCP connection requires the use of () handshake process B
A.2 B .3
C.4
41. What are the core IP protocol problems _______? B
A. Transfer B. Route finding
C. Encapsulation
42. Correct Understanding of ADSL is ______. B
A. Very high-speed digital user loop B. Asymmetric Digital user Loop
C. High-speed digital user Loop
43. In Linux, which directory stores the kernel? B
A./B./kernel
C./etc d./boot
The longest transmission distance of Multimode Optical Fiber in 44.100base-Fx is ()
A.500m B. 1km
C. 2 km d. 40km
45. () of the following IP addresses is Class C address d
A. 127.233.13.34 B .152.87.209.51
C.169.196.30.54 D. 202.96.209.21
46. Which of the following methods is not included in VLAN division? D
A. Based on port B. Based on MAC address
C. Protocol-based D. Physical location-based
47. Which of the following statements about DTE and DCE are true? B
A. the DTE device provides the clock for the DCE device B. the DCE device provides the clock for the DTE Device
48. What does N-ISDN mean? B
A. Bri B. PRI
49. What is the Transport Control Protocol (TCP. A
A. connection-oriented B. connectionless
50. IP Address Resolution Protocol (ARP) is used _____. B
A. map IP addresses to MAC addresses B. Map MAC addresses to IP addresses
51. Which of the following modes of switches cannot create VLANs? C
A. Server Mode B. Transparent Mode
C. Client Mode
52. Which of the following models does the router work in the ISO/OSI reference model _______. B
A. data link layer B. Network Layer
C. Transport Layer
53. The IPv6 address length is ______ bits. C
A.48 B .32
C.128
54. The first computer network to appear was () c
A. Internet B. NOVELL
C. arpanet d. Lan
55. Which of the following functions does a vswitch have? C
A. Forwarding filtering B. Loop avoidance
C. route forwarding D. Address Learning
56. The following () is virtual machine system.
A. VMware and Virtual pc B. VNC and PC Anywhere
57. Which of the following algorithms is Rip based on? A
A. Distance Vector B. Link Status
58. Which of the following authentication protocols is safer? B
A. Pap B. Chap
59. In Linux, which of the following commands can be used to disable the eth1 network interface? A
A. Service netork stop eth1 B. ifstop eth1
C. ifdown eth1
60. The following () language allows the browser to have an animation effect and provides real-time interaction for online users.
A. Java B. javascipt
C. c ++
61. The OSI Architecture defines a () layer model. B
A.6 B .7
C.8
62. Which of the following network devices work on the second layer of the OSI model? B
A. Hub B. vswitch
C. Router
63. Which of the following operating systems supports cluster functions? C
A. Windows 2000 Professional B .? Windows 2000 Server
C. Windows 2000 Advanced Server
65.224.0.0.5 represents _______. C
A. Host address B. broadcast address
C. multicast address
66.10.16.10.32/255.255.255.224 represents _____. B
A. Host address B. Network Address
C. broadcast address
67. in Linux, which file can be edited to set the default running level? B
A./etc/grub. conf B./etc/Lilo. conf
C./etc/runlevel D./etc/inittab
68. Which of the following commands is used to view the MAC address of the Nic? C
A. ipconfig/release B. ipconfig/Renew
C. ipconfig/All D. ipconfig/registerdns
69. Which of the following commands is used to add a default route on the router? C
A. Router # IP Route 0.0.0.0 0.0.0.0 192.168.100.1 B. Router # IP Route 0.0.0.0 255.255.255.255 192.168.100.1
C. Router (config) # IP Route 0.0.0.0 0.0.0.0 192.168.100.1 D. Router (config) # IP Route 0.0.0.0 255.255.255.255 192.168.100.1
Which of the following cables does 70.10base-t use? C
A. coarse coaxial cable B. Fine coaxial cable
C. Twisted Pair wires D. Optical Fiber
71. Which of the following commands is used to test network connectivity? C
A. Telnet B. NSLookup
C. Ping D. FTP
72. What is the subnet broadcast address of class C address 192.168.1.139? C
A.192.168.255.255 B .255.255.255.255
C.192.168.1.255
73. Which of the following subnet masks is correct _______. A
A.11011101---11011111---11101010---00001000 B .00000000---11111111---11110000---00000000
C.11111111---11111111---11111000---00000000
74. Which of the following is NOT a B/S computing mode? () B
A. Cross-platform compatibility B. Scattered management, difficult to maintain
75. X.25 public data network belongs to ()
A. Resource subnet B. Communication Subnet
76. In a Windows 2000? In which domain mode can a common group be used? A
A. hybrid mode B. Local Mode
77. What technologies are adopted on vswitches to avoid broadcast storms? A
A. stp B. VTP
78. What is the network ID of Class B address 172.16.10.28? B
A.255.255.255.0 B .255.255.0.0
79. If you are using Windows 98 to connect to the Internet, you must install Protocol B.
A. ppp B. TCP/IP
C. IPX/SPX
80. What is the number of hosts in network 203.87.90.0/24? A
A.254 B .255
C.256
81.160.128.1.1 belongs to the _______ address. B
A. a class B. B class
C. C Class
82. Correct Understanding of ATM is ______. A
A. asynchronous access mode B. Automatic Transmission Mode
C. Asynchronous Transfer Mode
83. Which of the following technologies do not belong to system security? () B
A. Firewall B. dongle
C. Authentication D. Anti-Virus
84. The ICMP protocol is directly hosted on the ________ protocol. A
A. ip B. TCP
C. udp d. PPP
85. Which protocol can be used to dynamically obtain IP addresses in the network? A
A. dhcp B. SNMP
C. ppp d. UDP
86. When configuring the default route, the destination address and mask should be
A. 0.0.0.0 and 0.0.0.0 B .0.0.0.0 and 255.255.255.255.255
C.20.255.255 and 255.255.255.255 d.255.255.255.255 and 0.0.0.0
87. Considering the security and cost factors, generally () is used for remote access B
A. ras B. VPN
88. In the TCP/IP protocol family, to transmit data between two user processes on a computer, you must use Protocol.
A. tcp B. UDP
89. Which of the following protocols is faster during data transmission? B
A. tcp B. UDP
90. Which of the following must be manually configured by the network administrator ________. A
A. Static Routing B. Direct Connection Routing
C. Dynamic Routing
91. Frame Relay achieves link reuse and forwarding in () B
A. Physical Layer B. Link Layer
C. Network Layer D. Transport Layer
92. Which of the following is the network layer protocol? B
A. TCP protocol B. IP protocol
C. SPX protocol D. HDLC Protocol
93. Which of the following routing protocols has the highest reliability? B
A. Rip B. OSPF
C. igrp d. Kerberos
94. Which of the following is the VPN protocol? B
A. PPP protocol B. PPTP Protocol
95. Which of the following commands is used to enter the privileged mode from the vro user mode? C
A. Router> logon B. Router> enter
C. Router> enable D. Router> resturn
96.10base5 indicates the data transmission rate of the cable is () mbpsb
A.5 B .10
97. File Sharing and transmission are usually implemented between Linux and Windows systems. Use () B
A. Samba B. FTP
98. What does N-ISDN mean? B
A. Bri B. PRI
99. The following () is a valid URL
A. http: www.ncie.gov.cn B. ftp://www.ncie.gov.cnabc.rar
C. <I> file: </I> // C:/downloads/abc.rar D. http://www.ncie.gov.cnabc.html
100. Which of the following IP addresses can be used on the Internet? B
A.169.254.18.91 B .211.101.198.97
C.172.16.29.87 d.198.87.256.230

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.