2014 network administrator-exam exercise Questions and answers (2)

Source: Internet
Author: User

51cto college specially sorted out "2014 network administrator-exam exercise Questions and Answers" in the soft exam preparation season to help schools pass smoothly! For more software proficiency test counseling and questions, please pay attention to the 51cto college-soft exam classification!


View summary:Exercise questions and answers for the 2014 soft exam Network Administrator examination [summary]650) This. width = 650; "alt =" popular article "src =" http://www.exam8.com/images/hot.gif "style =" padding: 0px; margin: 0px; Vertical-align: middle; Border: 0px; "/>


1. The database management technology is developed on the basis

A. File System

B. Compilation System

C. Application System

D. Database Management System

2. The three elements of a data model are data structures. Data Operations and

A. Data Security

B. Data compatibility

C. Data constraints

D. Data Maintenance

3. The primary goal of establishing a database system is to reduce data redundancy, improve data independence, and perform centralized checks.

A. Data operability

B. Data compatibility

C. Data Integrity

D. Data maintainability

4. When the CPU executes the program, in order to read commands from the memory, the content needs to be first transmitted to the Data Bus

A. instruction register

B. program counter (PC)

C. Mark register

D. Address Change register

5. The possibility of computer attacks cannot be reduced.

A. Select long and complex User Logon passwords.

B. Use anti-virus software

C. Avoid opening too many network services whenever possible

D. Periodically scan system hard disk fragments

6. the TCP/IP protocol is divided into four layers: application layer, transmission layer, and network interface layer. Which of the following protocols does not belong to the application layer?

A. SNMP

B. u

D. P

C. Telnet

D. FFP

7. When you connect to the Internet through a LAN

A. Mo

D. Em

B. Network Adapter

C. Phone number

D. Us

B. Interface

8. If the Intemet Domain Name of the web site is www.1wh.com and the IP address is 192.168.1.21

C. p Port

To 8080, the user can access the website after entering it in the address bar of the browser.

A. http: // 192.168.1.21

B. http://www.1wh.com

C. http: // 192.168.1.21: 8080

D. http://www.1wh.com/8080

9. Each web site must have a main directory for publishing information. The default main directory of lis is. In addition to the main directory, you can also use virtual directories as the publishing directory.

A. \ website

B. \ Inetpub \ wwwroot

C. \ Internet

D. \ Internet \ website

10. In the LAN model, the data link layer is divided

A. Logical Link Control Sub-layer and network sub-Layer

B. Logical Link Control Sub-layer and Media Access Control Sub-Layer

C. Network Interface access control sub-layer and Media Access Control Sub-Layer

D. Logical Link Control Sub-layer and network interface access control sub-Layer

11. network management is basically composed of four elements: Network Manager, network management proxy, network management protocol, and management information library. When the network management proxy sends an asynchronous event report to the Management Station, the operation used is

A. Get

B. Get-next

C. Trap

D. Set

12. Which of the following statements correctly describe the routing protocol?

A. protocol that allows data packets to be transmitted between hosts

B. One way to define the format and usage of the domain in the data packet

C. A protocol for Route Selection by executing an algorithm

D. A protocol used to specify the method and time for binding MAC addresses and IP addresses

13. Which of the following content is not included in route information?

A. Source Address

B. Next Hop

C. Target Network

D. Route weight

14. Which of the following statements are true?

A. The route priority is the same as that calculated for the route weight.

B. The calculation of Route weights may be based on a single path feature or multiple path attributes.

C. If several dynamic routing protocols find the best route to the same target network, these routes will be added to the routing table.

D. The dynamic routing protocol is used to determine the route quality based on the route weight, and the judgment methods of each route protocol are different.

15. The network topology of the Internet is a () structure.

A. linear type

B. Network Type

C. Bus Type

D. rectangle

16. The slip and PPP protocols both belong to () communication methods.

A. Point-to-Point

B. opposite to the point

C. Face points

D. Face to face

17. In the bri service of ISDN, the speed of a B channel is ()

A. 64 Kbps

B. 128 Kbps

C. 256 kbps

D. 1 Mbps

18. The advantage of using a domain name is ()

A. Convenient Management

B. Easy to remember

C. Save Money

D. Convenient Input

19. There are two switch methods. The () method is suitable for scenarios with many line errors.

A. Direct forwarding

B. Storage forwarding

C. Storage Management

D. Indirect forwarding

20. The LAN standard corresponds to the OSI model layer

A. Upper Layer 3

B. Middle Layer 3

C. Lower Layer 3

D. All

21. Check for () errors in parity

A. 1

B. 2

C. 3

D. 0

22. In the 10base-t standard, the distance between the hub and the computer through the RJ-45 interface cannot exceed ()

A. 100 m

B. 150 m

C. 200 m

D. 300 m

23. In the firewall system, the firewall cannot solve Network () Security Problems

A. External

B. DMZ

C. Internal

D. Middleware

24. Using an image server, the link speed of connecting two servers is only more effective than the LAN speed ().

A. Fast

B. consistent

C. Slow

D. Transit

25. Among the two protocols in email, the () protocol is the protocol between the transmission program and the remote mail server.

A. SMTP

B. TCP

C. POP3

D. ARP

26. A large number of general-purpose registers are set in the short instruction system computer's computer, and the Instruction format is only R-R-type addressing, in order

A. Simplified Command Format

B. Improve the instruction operation speed

C. ease of use

D. Reduce the address computing time

27. In a file system, files are accessed by name

A. It is convenient for the operating system to manage information.

B. ease of use

C. Determine the object access permission

D. Enhance Confidentiality of documents

28. The operating system that allows multiple computers in the system to collaborate to complete a task is

A. Batch Processing Operating System

B. time-sharing Operating System

C. Network Operating System

D. Distributed Operating System

29. What does not belong to the storage management function is

A. Primary storage space allocation and recovery

B. sharing and protection of primary storage space

C. Management of auxiliary storage space

D. Implement address translation

30. Integrity rules that must be followed for data and update operations of relational databases include

A. entity integrity and reference integrity

B. Integrity of reference and user-defined integrity

C. entity integrity and user-defined integrity

D. entity integrity. Integrity of reference and user-defined integrity

  Reference answer:

1-10 accbc dbcba

11-20 bcbca aadbc

21-30 abcaa bbdcd



Recommended high-quality articles:

Preparing for the 2014 soft exam! Recommendation of high-quality video tutorials (Comprehensive review + experience sharing + pre-test Sprint)

Testing Questions of the soft exam over the years (Network Management + programmers + Information Technology + expert prediction questions)

Soft exam intermediate exam self-testing over the years and the latest video summary (network workers + software + database + expert prediction questions)

Knowledge points of Network Management in 2014 computer soft examination [summary]


For online soft test video tutorials, click:

Http://edu.51cto.com/course/courseList/id-44.html



650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/3D/9F/wKioL1PE_n3z629yAACXIHScsJM092.jpg "alt =" wkiol1pe_n3z629yaacxihscsjm092.jpg "style =" padding: 0px; margin: 0px; Vertical-align: Top; Border: none; "/>


This article is from the "51cto college official blog" blog, please be sure to keep this source http://51edu.blog.51cto.com/8899635/1539344

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.