For candidates who want to participate in the second half of the network administrator exam , the first half of 2016 network administrator exam real problem is the baby, the following Greek soft Test college for you to organize the morning real problem, for your reference study.
2016 first half network administrator exam morning real problem (51-75)
A digital signature usually uses () to encrypt the message digest, and the receiver uses () to verify the signature.
(Wuyi)) A. Sender's private key
B Sender's public key
C The private key of the receiving party
D The public key of the receiving party
(A). Sender's private key
B Sender's public key
C The private key of the receiving party
D The public key of the receiving party
The following tunneling protocols, which work at the network layer are ().
(+)) A. L2tp
B Ssl
C PPTP
D Ipsec
The following viruses, which belong to the script virus, are ().
(SI) A. trojan.qq3344
B Sasser
C VBS. HappyTime
D Macro.melissa
In order to attack remote hosts, it is common to use () _ Technology to detect remote host status.
(A). Virus Avira
B Port scan
C QQ Chat
D Identity verification
In the following algorithm, the asymmetric key encryption algorithm is ().
(+)) A. Des
B SHA-1
C MD5
D Rsa
SNMP belongs to the OSI/RM () protocol.
(A). Management level
B Application Layer
C Transport Layer
D Network layer
The SNMP management model consists of 4 parts, which are the management station, (), the Network Management Protocol and the management information base.
(+) A. Management Console
B Management agent
C Management standards
D Network administrator
The following management functions, which belong to configuration management, are ().
()) A. Collecting status information for network runs
B Collect and respond to error detection reports
C Calculate Network Service charges that users should pay
D Analyze the security risks of network systems
In a Windows XP system, the Network Places folder displays shortcuts to shared computers, printers, and other resources on the network. As shown in the graphical interface of the WIN7 system, the "My Network Places" icon is missing, instead of "My Network Places" ().
650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-14/ Cde6fc3f-63f7-496c-89d3-ba563bf8b84d.png "style=" Float:none; "alt=" cde6fc3f-63f7-496c-89d3-ba563bf8b84d.png "/ >
(A). Favorite Folders
B Internet
C Document
D Download
Use the ping command to perform network detection, and in the case of a series of tests, the first thing to do is () in accordance with the from near principle.
(a.ping) Default gateway
B Ping local IP
C Ping 127.0.0.1
D Ping remote Host
The following Linux commands are in CD: \.. The function is ().
(+) A. Go to directory \
B Return to directory \
C Return to Level table of contents
D Return to level two directory
In the Linux operating system, the directory "Etc/dev" is primarily used for storage ().
(+) A. Device files
B Configuration file
C Command file
D Process and System Information
In the Windows operating system, the function of the Ipconfig/all command is ().
(+) A. Configure local Host network configuration information
B View Local Host network configuration information
C Configure remote Host network configuration information
D View Remote Host network configuration information
In a home network, the following IP address () can be assigned to a terminal device by a DHCP server.
(+)) A. 169.254.30.21
B 72.15.2.1
C 192.168.255.21
D 11.15.248.128
In HTML, the output ">" symbol should be used ().
(A). Gt
B \gt
C >
D %gt
Type commands in the Windows command-line window
C:\>nslookup
Set TYPE=MX
>202.30.192.2
The function of this command sequence is to query ().
(+) A. Mail server information
B IP-to-domain mapping
C Zone Licensing Server
D Information resource records available in the zone
In the following services, the Transport Layer uses UDP ().
(a.http) View page
B VoIP Network telephony
C SMTP Send mail
D FTP File Transfer
The Windows command line input () command gets the results shown.
650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-14/ A4157f1b-a74e-4aec-ac6d-204b28cf6a0a.png "style=" Float:none; "alt=" a4157f1b-a74e-4aec-ac6d-204b28cf6a0a.png "/ >
(A). Arp-a
B Ping 192.168.1.1
C Netstat-r
D Nslookrup
The Intemet protocol attribute parameter for a PC, as shown, is the IP address of the default gateway ().
650) this.width=650; "Src=" http://www.educity.cn/article_images/2016-06-14/ B6265481-b948-4cf6-9007-c602bef51a9d.png "style=" Float:none; "alt=" b6265481-b948-4cf6-9007-c602bef51a9d.png "/ >
(b) A. 8.8.8.8
B 202.117.115.3
C 192.168.2.254
D 202.117.115.18
The use of network (), systems a effectively isolate an organization's internal network structure from an () Network,such As the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer () between networks,usually offering controlled Telnet,ftp,and SM TP access. With the emergence of more sophisticated () layer protocols designed to facilitate global information discovery,there exists A need to provide a general () for these protocols to transparently and securely traverse a firewall.
() A. Safeguards
B Firewalls
C Routers
D Switches
(A). Exterior
B Internal
C Centre
D Middle
(A). Hosts
B Routers
C Gateways
D Offices
() A. Network
B Session
C Transmission
D Application
(+) A. Framework
B Internetwork
C Computer
D Application
2016 first half network administrator exam morning real title (51-75)