51cto college specially sorted out "2014 network administrator-exam exercise Questions and Answers" in the soft exam preparation season to help schools pass smoothly! For more software proficiency test counseling and questions, please pay attention to the 51cto college-soft exam classification!
View summary:Exercise questions and answers for the 2014 soft exam Network Administrator examination [summary]650) This. width = 650; "alt =" popular article "src =" http://www.exam8.com/images/hot.gif "style =" padding: 0px; margin: 0px; Vertical-align: middle; Border: 0px; "/>
1. The database management technology is developed on the basis
A. File System
B. Compilation System
C. Application System
D. Database Management System
2. The three elements of a data model are data structures. Data Operations and
A. Data Security
B. Data compatibility
C. Data constraints
D. Data Maintenance
3. The primary goal of establishing a database system is to reduce data redundancy, improve data independence, and perform centralized checks.
A. Data operability
B. Data compatibility
C. Data Integrity
D. Data maintainability
4. When the CPU executes the program, in order to read commands from the memory, the content needs to be first transmitted to the Data Bus
A. instruction register
B. program counter (PC)
C. Mark register
D. Address Change register
5. The possibility of computer attacks cannot be reduced.
A. Select long and complex User Logon passwords.
B. Use anti-virus software
C. Avoid opening too many network services whenever possible
D. Periodically scan system hard disk fragments
6. the TCP/IP protocol is divided into four layers: application layer, transmission layer, and network interface layer. Which of the following protocols does not belong to the application layer?
A. SNMP
B. u
D. P
C. Telnet
D. FFP
7. When you connect to the Internet through a LAN
A. Mo
D. Em
B. Network Adapter
C. Phone number
D. Us
B. Interface
8. If the Intemet Domain Name of the web site is www.1wh.com and the IP address is 192.168.1.21
C. p Port
To 8080, the user can access the website after entering it in the address bar of the browser.
A. http: // 192.168.1.21
B. http://www.1wh.com
C. http: // 192.168.1.21: 8080
D. http://www.1wh.com/8080
9. Each web site must have a main directory for publishing information. The default main directory of lis is. In addition to the main directory, you can also use virtual directories as the publishing directory.
A. \ website
B. \ Inetpub \ wwwroot
C. \ Internet
D. \ Internet \ website
10. In the LAN model, the data link layer is divided
A. Logical Link Control Sub-layer and network sub-Layer
B. Logical Link Control Sub-layer and Media Access Control Sub-Layer
C. Network Interface access control sub-layer and Media Access Control Sub-Layer
D. Logical Link Control Sub-layer and network interface access control sub-Layer
11. network management is basically composed of four elements: Network Manager, network management proxy, network management protocol, and management information library. When the network management proxy sends an asynchronous event report to the Management Station, the operation used is
A. Get
B. Get-next
C. Trap
D. Set
12. Which of the following statements correctly describe the routing protocol?
A. protocol that allows data packets to be transmitted between hosts
B. One way to define the format and usage of the domain in the data packet
C. A protocol for Route Selection by executing an algorithm
D. A protocol used to specify the method and time for binding MAC addresses and IP addresses
13. Which of the following content is not included in route information?
A. Source Address
B. Next Hop
C. Target Network
D. Route weight
14. Which of the following statements are true?
A. The route priority is the same as that calculated for the route weight.
B. The calculation of Route weights may be based on a single path feature or multiple path attributes.
C. If several dynamic routing protocols find the best route to the same target network, these routes will be added to the routing table.
D. The dynamic routing protocol is used to determine the route quality based on the route weight, and the judgment methods of each route protocol are different.
15. The network topology of the Internet is a () structure.
A. linear type
B. Network Type
C. Bus Type
D. rectangle
16. The slip and PPP protocols both belong to () communication methods.
A. Point-to-Point
B. opposite to the point
C. Face points
D. Face to face
17. In the bri service of ISDN, the speed of a B channel is ()
A. 64 Kbps
B. 128 Kbps
C. 256 kbps
D. 1 Mbps
18. The advantage of using a domain name is ()
A. Convenient Management
B. Easy to remember
C. Save Money
D. Convenient Input
19. There are two switch methods. The () method is suitable for scenarios with many line errors.
A. Direct forwarding
B. Storage forwarding
C. Storage Management
D. Indirect forwarding
20. The LAN standard corresponds to the OSI model layer
A. Upper Layer 3
B. Middle Layer 3
C. Lower Layer 3
D. All
21. Check for () errors in parity
A. 1
B. 2
C. 3
D. 0
22. In the 10base-t standard, the distance between the hub and the computer through the RJ-45 interface cannot exceed ()
A. 100 m
B. 150 m
C. 200 m
D. 300 m
23. In the firewall system, the firewall cannot solve Network () Security Problems
A. External
B. DMZ
C. Internal
D. Middleware
24. Using an image server, the link speed of connecting two servers is only more effective than the LAN speed ().
A. Fast
B. consistent
C. Slow
D. Transit
25. Among the two protocols in email, the () protocol is the protocol between the transmission program and the remote mail server.
A. SMTP
B. TCP
C. POP3
D. ARP
26. A large number of general-purpose registers are set in the short instruction system computer's computer, and the Instruction format is only R-R-type addressing, in order
A. Simplified Command Format
B. Improve the instruction operation speed
C. ease of use
D. Reduce the address computing time
27. In a file system, files are accessed by name
A. It is convenient for the operating system to manage information.
B. ease of use
C. Determine the object access permission
D. Enhance Confidentiality of documents
28. The operating system that allows multiple computers in the system to collaborate to complete a task is
A. Batch Processing Operating System
B. time-sharing Operating System
C. Network Operating System
D. Distributed Operating System
29. What does not belong to the storage management function is
A. Primary storage space allocation and recovery
B. sharing and protection of primary storage space
C. Management of auxiliary storage space
D. Implement address translation
30. Integrity rules that must be followed for data and update operations of relational databases include
A. entity integrity and reference integrity
B. Integrity of reference and user-defined integrity
C. entity integrity and user-defined integrity
D. entity integrity. Integrity of reference and user-defined integrity
Reference answer:
1-10 accbc dbcba
11-20 bcbca aadbc
21-30 abcaa bbdcd
Recommended high-quality articles:
Preparing for the 2014 soft exam! Recommendation of high-quality video tutorials (Comprehensive review + experience sharing + pre-test Sprint)
Testing Questions of the soft exam over the years (Network Management + programmers + Information Technology + expert prediction questions)
Soft exam intermediate exam self-testing over the years and the latest video summary (network workers + software + database + expert prediction questions)
Knowledge points of Network Management in 2014 computer soft examination [summary]
For online soft test video tutorials, click:
Http://edu.51cto.com/course/courseList/id-44.html
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/3D/9F/wKioL1PE_n3z629yAACXIHScsJM092.jpg "alt =" wkiol1pe_n3z629yaacxihscsjm092.jpg "style =" padding: 0px; margin: 0px; Vertical-align: Top; Border: none; "/>
This article is from the "51cto college official blog" blog, please be sure to keep this source http://51edu.blog.51cto.com/8899635/1539344