2016 first half network administrator exam morning real title (51-75)

Source: Internet
Author: User
Tags ftp file snmp ftp file transfer

For candidates who want to participate in the second half of the network administrator exam , the first half of 2016 network administrator exam real problem is the baby, the following Greek soft Test college for you to organize the morning real problem, for your reference study.


2016 first half network administrator exam morning real problem (51-75)

A digital signature usually uses () to encrypt the message digest, and the receiver uses () to verify the signature.

(Wuyi)) A. Sender's private key

B Sender's public key

C The private key of the receiving party

D The public key of the receiving party

(A). Sender's private key

B Sender's public key

C The private key of the receiving party

D The public key of the receiving party

The following tunneling protocols, which work at the network layer are ().

(+)) A. L2tp

B Ssl

C PPTP

D Ipsec

The following viruses, which belong to the script virus, are ().

(SI) A. trojan.qq3344

B Sasser

C VBS. HappyTime

D Macro.melissa

In order to attack remote hosts, it is common to use () _ Technology to detect remote host status.

(A). Virus Avira

B Port scan

C QQ Chat

D Identity verification

In the following algorithm, the asymmetric key encryption algorithm is ().

(+)) A. Des

B SHA-1

C MD5

D Rsa

SNMP belongs to the OSI/RM () protocol.

(A). Management level

B Application Layer

C Transport Layer

D Network layer

The SNMP management model consists of 4 parts, which are the management station, (), the Network Management Protocol and the management information base.

(+) A. Management Console

B Management agent

C Management standards

D Network administrator

The following management functions, which belong to configuration management, are ().

()) A. Collecting status information for network runs

B Collect and respond to error detection reports

C Calculate Network Service charges that users should pay

D Analyze the security risks of network systems

In a Windows XP system, the Network Places folder displays shortcuts to shared computers, printers, and other resources on the network. As shown in the graphical interface of the WIN7 system, the "My Network Places" icon is missing, instead of "My Network Places" ().

650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-14/ Cde6fc3f-63f7-496c-89d3-ba563bf8b84d.png "style=" Float:none; "alt=" cde6fc3f-63f7-496c-89d3-ba563bf8b84d.png "/ >


(A). Favorite Folders

B Internet

C Document

D Download

Use the ping command to perform network detection, and in the case of a series of tests, the first thing to do is () in accordance with the from near principle.

(a.ping) Default gateway

B Ping local IP

C Ping 127.0.0.1

D Ping remote Host

The following Linux commands are in CD: \.. The function is ().

(+) A. Go to directory \

B Return to directory \

C Return to Level table of contents

D Return to level two directory

In the Linux operating system, the directory "Etc/dev" is primarily used for storage ().

(+) A. Device files

B Configuration file

C Command file

D Process and System Information

In the Windows operating system, the function of the Ipconfig/all command is ().

(+) A. Configure local Host network configuration information

B View Local Host network configuration information

C Configure remote Host network configuration information

D View Remote Host network configuration information

In a home network, the following IP address () can be assigned to a terminal device by a DHCP server.

(+)) A. 169.254.30.21

B 72.15.2.1

C 192.168.255.21

D 11.15.248.128

In HTML, the output ">" symbol should be used ().

(A). Gt

B \gt

C &gt

D %gt

Type commands in the Windows command-line window

C:\>nslookup

Set TYPE=MX

>202.30.192.2

The function of this command sequence is to query ().

(+) A. Mail server information

B IP-to-domain mapping

C Zone Licensing Server

D Information resource records available in the zone

In the following services, the Transport Layer uses UDP ().

(a.http) View page

B VoIP Network telephony

C SMTP Send mail

D FTP File Transfer

The Windows command line input () command gets the results shown.

650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-14/ A4157f1b-a74e-4aec-ac6d-204b28cf6a0a.png "style=" Float:none; "alt=" a4157f1b-a74e-4aec-ac6d-204b28cf6a0a.png "/ >

(A). Arp-a

B Ping 192.168.1.1

C Netstat-r

D Nslookrup

The Intemet protocol attribute parameter for a PC, as shown, is the IP address of the default gateway ().

650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-14/ B6265481-b948-4cf6-9007-c602bef51a9d.png "style=" Float:none; "alt=" b6265481-b948-4cf6-9007-c602bef51a9d.png "/ >

(b) A. 8.8.8.8

B 202.117.115.3

C 192.168.2.254

D 202.117.115.18

The use of network (), systems a effectively isolate an organization's internal network structure from an () Network,such As the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer () between networks,usually offering controlled Telnet,ftp,and SM TP access. With the emergence of more sophisticated () layer protocols designed to facilitate global information discovery,there exists A need to provide a general () for these protocols to transparently and securely traverse a firewall.

() A. Safeguards

B Firewalls

C Routers

D Switches

(A). Exterior

B Internal

C Centre

D Middle

(A). Hosts

B Routers

C Gateways

D Offices

() A. Network

B Session

C Transmission

D Application

(+) A. Framework

B Internetwork

C Computer

D Application

2016 first half network administrator exam morning real title (51-75)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.