[Computer Level 3 Network Technology] Practice Questions for Chapter Six



insert image description here


IPS (Intrusion Prevention System) related knowledge points

1. Intrusion Prevention System (IPS) integrates firewall technology and intrusion detection technology, works in In-Line(内联)mode, and has 嗅探functions.

2. IPS is mainly divided into host-based IPS (HIPS), network-based IPS (NIPS) and application IPS (AIPS).

3. HIPS Deployed in the protected host system, you can监视内核的系统调用,阻挡攻击。

4. NIPSArranged at the exit of the network, generally connected in series between the firewall and the router (connected in series in the protected link), NIPS 误报(不是漏报)will block legitimate communication due to attacks.

5. AIPSGenerally deployed in protected 应用服务器前端.

Relevant real questions over the years

Question 1: Application Intrusion Prevention System (AIPS) in general 部署在().

A. Protected 应用服务器前端
B. In the protected application server
C. Protected application server backend
D. The exit of the network

Correct answer: A
Reference analysis:
[Analysis] Intrusion prevention systems are mainly divided into three types: host-based intrusion prevention systems, which are installed in the protected host system to detect and block threats and attacks targeting the machine; network-based intrusion prevention systems, arranged at the network exit, generally connected in series between firewalls and routers, and all incoming and outgoing data flows from the network must pass through it; application intrusion prevention systems, generally deployed on the front end of application servers, extend the functions of host-based and intrusion prevention systems to high-performance network devices before the server.

Question 2: In the following description about IPS, 错误的是().

A. NIPS should be connected in series in the protected link. B. NIPS will block legitimate communication
against attacks. C. HIPS can monitor kernel system calls and block attacks. D. AIPS is generally deployed at the front end of application servers漏报

Correct answer: B
Reference analysis:
[Analysis] NIPS is arranged at the exit of the network, and is generally connected in series between the firewall and the router. For NIPS, the accuracy and high performance of intrusion detection are very important. False positives of an attack will cause legitimate communications to be blocked, resulting in a denial of service. HIPS is installed on the protected host system to detect and block threats and attacks against the host. It is closely integrated with the operating system kernel, monitors the system calls of the kernel, blocks attacks, and records logs. AIPS is generally deployed at the front end of the application server to ensure the security of the application server, so option B is wrong.

A. NIPS 漏报will block legitimate communication due to attacks.
B. AIPS is generally deployed on the front end of application servers.
C. HIPS can monitor kernel system calls and block attacks
. D. IPS works in In-Line mode

Correct answer: A
Reference analysis:
[Analysis] The intrusion prevention system (IPS) integrates firewall technology and intrusion detection technology, and adopts the In line working mode. IPS is mainly divided into host-based IPS (HIPS), network-based IPS (NIPS) and application IPS (AIPS). False reporting of attacks by NIPS will result in the blocking of legitimate communications and even denial of service. HIPS is tightly bundled with the operating system kernel, monitors the system calls of the kernel, blocks attacks, and records logs. AIPS is developed from HIPS and is usually deployed on the front end of an application server.

A. NIPS false positives on attacks will lead to legitimate communication being blocked.
B. HIPS can block attacks by monitoring the system calls of the kernel.
C. AIPS is generally deployed in front of the protected server.
D. IPS needs to use TAP (tap) to access the network

Correct answer: D
Reference analysis: D
[Analysis] Intrusion Prevention System (IPS) is a computer network security facility and an explanation of antivirus software and firewalls. The intrusion prevention system is a computer network security device that can monitor the network data transmission behavior of the network or network equipment, and can immediately interrupt, adjust or isolate some abnormal or harmful network data transmission behaviors. And TAP (Tap) is used in Intrusion Detection System (IDS), which is used to analyze and process the data packets in the switched network. So choose option D.

A. NIPS false alarms on attacks will lead to the blocking of legitimate communications.
B. HIPS can block attacks by monitoring the system calls of the kernel.
C. AIPS is generally deployed in front of the protected server
. D. IPS is connected to the network.需使用集线器

Correct answer: D
Reference analysis:
[Analysis] The intrusion prevention system (IPS) integrates firewall technology and intrusion detection technology, and adopts the In-line working mode. All received data packets must be inspected by the intrusion prevention system to decide whether to release them, or implement caching and discarding strategies, send an alarm in time when an attack occurs, and record network attack events, measures and results taken. Choose option D.

Question 3: In the following description about IPS, 正确的是( ).
A. HIPSGenerally deployed on the front end of the application server
B. AIPSAttacks can be blocked by monitoring the system calls of the kernel
C. False reports of attacks by NIPS will cause legitimate communication to be blocked
D. IPS 不具备sniffing function

Correct answer: C
Reference analysis:
[Analysis] HIPS (Host-based Intrusion Prevention System, host-based intrusion prevention system) is installed in the protected host system to detect and block threats and attacks aimed at the machine. AIPS (Application Intrusion Prevention System, Application Intrusion Prevention System) is generally deployed on the front end of the application server, so as to extend the function of the host-based intrusion prevention system to the high-performance network equipment in front of the server, thereby ensuring the security of the application server. NIPS (Network-based Intrusion Prevention System, network-based intrusion prevention system) is generally arranged at the exit of the network, and is generally connected in series between the firewall and the router. All data flows in and out of the network must pass through it, thereby protecting the security of the entire network. Because network false positives will lead to legitimate communication being blocked, leading to denial of service, and insufficient performance will cause legal communication delays, and even become a network bottleneck. IPS (Intrusion Prevention System, Intrusion Prevention System) is mainly composed of sniffer, detection analysis component, policy execution component, status switch, log system and console. The sniffer is mainly responsible for receiving data packets, analyzing the protocol type of the data packet, opening a buffer according to the protocol type, saving the received data packet, and submitting the detection and analysis component for analysis and processing.

A. IPS works on 旁路模式
B. HIPSIt is generally deployed on the front end of the application server
. C. AIPSIt can monitor the system calls of the kernel and block attacks
. D. False reports of attacks by NIPS will cause legitimate communication to be blocked

Correct answer: D
Refer to Analysis:
[Analysis] IPS采用In-Line (内联)工作模式. Host-based intrusion prevention systems (HIPS)are generally deployed in protected host systems to monitor kernel system calls and block attacks. Application intrusion prevention systems (AIPS)are generally deployed in front of protected application servers and can prevent many intrusions. The network-based intrusion prevention system (NIPS)is arranged at the exit of the network, and is generally connected in series between the firewall and the router. False reports of attacks will result in the blocking of legitimate communications. So choose option D.

A. AIPS 和HIPSis generally deployed on the front end of the application server
. B. NIPSIt can block attacks by monitoring the system calls of the kernel.
C. NIPS 漏报will block legitimate communications against attacks
. D. IPS has sniffing functions like IDS.

Correct answer: D
Reference analysis:
[Analysis] AIPS is generally deployed at the front end of the application server. HIPS can block attacks by monitoring the system calls of the kernel. False positives of attacks by NIPS can result in legitimate communications being blocked. So choose option D.

Bluetooth

1. The working frequency band is in the ISM frequency band of 2.402GHz~2.480GHz.

2. The synchronous channel rate is 64kbps.

3. The frequency hopping rate is 1600 times/second, and the number of frequency points is 79 frequency points/MHz.

4. The asymmetric asynchronous channel rate is 723. 2kbps/57.6kbps, and the symmetrical asynchronous channel rate is 433. 9kbps (full duplex).

5. When the transmission power is 0dBm (1mW), the coverage is 1~10 meters, and when the transmission power is 20dBm (100mW), the coverage is 100 meters.

6. The channel spacing is 1MHz.

7. The nominal data rate is 1Mbps.

8. The voice encoding method is CVSD or logarithmic PCM.

Relevant real questions over the years

Question 1: 蓝牙In the following description of the technical indicators of the system, 错误的是( ).

A. The working frequency band is in the ISM frequency band of 2.402GHz~2.480GHz

B. The nominal data rate is 1Mbps

C. The asynchronous channel rate of the symmetrical connection is 433.9kbps

D. The synchronization channel rate is192kbps

Correct answer: D
Reference analysis:
[Analysis] 蓝牙技术的同步信道速率是64kbps, not 192kbps.
D option is wrong.

Question 2: 蓝牙In the following description about technology, 错误的是().

A. The working frequency range is 2.402GHz~2.480GHz

B. 非对称The asynchronous channel rate of the connection is433.9kbps/57.6kbps

C. The synchronous channel rate is 64kbps

D. Extended coverage is 100 meters

Correct answer: B
Reference analysis:
[Analysis] The asynchronous channel rate of the Bluetooth system:
(1) The asynchronous channel rate of the asymmetric connection is 732.2Kbps/57.6Kbps.
(2) Symmetrical connection is 433.9Kbps (full-duplex mode).
Therefore, the correct answer to this question is B.

Question 5: In the following description of Bluetooth technology, 错误的是().

A. The frequency hopping rate is 1600 times/second, and the number of frequency points is 79 frequency points/MHz

B. The synchronization channel rate is128kbps

C. Working in the ISM frequency band of 2.402GHz~2.480GHz

D. The asynchronous channel rate of the asymmetric connection is 723.2kbps/57.6kbps

Correct answer: B
Reference analysis:
[Analysis] The synchronous channel rate is 64kbps, so choose option B.

Question 6: In the following description of Bluetooth technology, 错误的是( ).

A. The frequency hopping rate is 1600 times/second

B. The synchronous channel rate is 64kbps

C. The asynchronous channel rate of the symmetrical connection is 433.9kbps

D. 0dBm(1mW)When , the coverage100米

Correct answer: D
Reference analysis:
[Analysis] When the transmission power of the Bluetooth system is 0dBm (1mW), the coverage is 1-10 meters, and when the transmission power is 20dBm (100mW), the coverage is 100 meters.

Question 10: In the following description of Bluetooth technical indicators, 错误的是( ).

A. The key increases in units of 8 bits,最长256bit

B. When the transmit power is 20dBm, the coverage range is 100m

C. The frequency hopping rate is 1600 times/second

D. Data connection methods include connection-oriented service SCO and connectionless service ACL

Correct answer: A
Refer to Analysis:
[Analysis] 密钥以8bit为单位增长,最长128bit, so choose option A.

Question 15: In the following descriptions of Bluetooth technical indicators, 错误的是().

A. The voice encoding method is CVSD or logarithmic PCM

B. The frequency hopping rate is1640次/秒

C. Transmission power and coverage: 0dBm covers 1-10m, 20dBm covers 100m

D. Synchronous channel rate: 64kbps (3 full-duplex channels)

Correct answer: B
Reference analysis:
[Analysis] The frequency hopping rate is 1600次/秒. So choose option B.

Question 14: In the following description about IEEE802.11 series standards, 错误的是( ).

A. EEE802.11a works in the 5GHz UNII frequency band

B. The maximum transmission rate of IEEE802.11g is 54Mbps

C. The maximum capacity of IEEE802.11b is 33Mbps

D. The frequency band used by IEEE802.11b 不会interferes with each other with wireless phones, Bluetooth, microwave ovens, etc.

Correct answer: D
Reference analysis:
[Analysis] The frequency band used by IEEE 802.11b will interfere with wireless phones, Bluetooth, microwave ovens, etc. So choose option D.

Question 19: In the following descriptions of IEEE802.11 series standards, the error is ( ).

A. The frequency band used by IEEE802.11g 不会interferes with wireless phones, Bluetooth, microwave ovens, etc.

B. The maximum transmission rate of IEEE802.11g is 54Mbps

C. The maximum capacity of IEEE802.11b is 33Mbps

D. IEEE802.11a works in the 5GHz frequency band

Correct answer: A
Reference analysis:
[Analysis] IEEE802.11g works in the 2.4GHz ISM frequency band. Interference with other devices such as cordless phones, bluetooth, microwave ovens. So choose option A.

server technology

1. 热插拔功能Allow users to replace hard drives, boards, power supplies, etc. (main boards and main backplanes cannot be replaced) without cutting off the power supply.

2. 集群技术In the middle, if a host fails, it will not affect the normal service, but it will affect the system performance.

3. 磁盘性能Performance in storage capacity and I/O speed.

4. 服务器总体性能It depends on the number of CPUs, CPU main frequency, system memory, and network speed (only the number of CPUs is wrong).

5. RAID 技术The disk storage capacity can be increased but the fault tolerance cannot be improved.

6. RISC 结构处理器The server used usually uses UNIX system (not Windows, Android).

7. 分布式内存访问(NUMA) technology combines symmetric multiprocessor (SMP) and cluster (Cluster) technology.

8. 对称多处理技术It can balance the load in the server with multi-CPU structure.

9. The mean time between failures (MTBF) is usually used to measure the reliability of the system , and the mean time to repair (MTBR) is used to measure the maintainability of the system . The availability of the system is defined as: availability = MTBF/(MTBF+MTBR), and the availability of routers can be described by MTBF.

Relevant real questions over the years

Question 1: In the following description about server technology, the wrong one is ().

A. Server disk performance is reflected in disk storage capacity and 1/0 speed

B. When a host in the cluster system fails, it will not affect the normal service of the system

C. The hot swap function allows users to replace hard drives, boards, etc. without cutting off the power supply

D. Overall performance of servers using symmetric multiprocessor (SMP) technology取决于CPU的数量

Correct answer: D
Reference analysis:
[Analysis] The indicators for evaluating high-performance storage technology are mainly 1/0 speed and disk storage capacity. Cluster (Cluster) technology is to provide high-speed communication lines to a group of independent computers to form a server system with shared data storage space. If a host fails, the program it runs will be transferred to other hosts. Therefore, the cluster computer technology can greatly improve the reliability, availability and disaster recovery capability of the server. The hot-swap function allows users to replace faulty hard disks, boards and other components without cutting off the power supply, thereby improving the system's ability to respond to emergencies. 服务器总体性能不仅仅取决于CPU数量,而且与CPU主频、系统内存、网络速度等都有关系.

Question 2: In the following description about server technology, 错误的是( ).

A. The hot swap function allows users to replace hard drives, boards, etc. without cutting off the power supply

B. When a host in the cluster system fails, it will not affect the normal service of the system

C. 服务器的可用性Described by MTBF

D. Server disk performance is reflected in disk storage capacity and 1/0 speed

Correct answer: C
Reference analysis:
[Analysis] Usually, the mean time between failures (MTBF) is used to measure the reliability of the system, and the mean time to repair (MTBR) is used to measure the maintainability of the system, and the availability of the system is defined as: Availability = MTBF/(MTBF+MTBR), so item C is wrong. 路由器The availability of can be described by MTBF.

Question 3: Which of the following descriptions about server technology is wrong ( ).

A. Symmetric multiprocessing technology can balance the load in a server with multi-CPU structure

B. When a host in the cluster system fails, it will not affect the normal service of the system

C. Servers using RISC processors usually do not use Windows operating systems

D. Use RAID技术can improve disk fault tolerance

Correct answer: D
Reference analysis:
[Analysis] RAID is a disk array technology to a certain extent 可以提磁盘存储容量but cannot improve fault tolerance.

Question 4: Which of the following descriptions about server technology is wrong ( ).

A. When a host in the cluster system fails不会影响系统的性能

B. Servers using RISC processors usually use UNIX systems

C. The hot swap function allows users to replace hard drives, power supplies, etc. without cutting off the power supply

D. Distributed memory access (NUMA) technology combines symmetric multiprocessor (SMP) and cluster (Cluster) technology

Correct answer: A
Reference analysis:
[Analysis] Cluster cluster refers to a group of connected computers, which work together like a computer to the outside world, and are generally used for high-performance computing that cannot be completed by a single computer. In the cluster, when a host in the server group fails, the program is immediately transferred to other hosts to run. Although a host fails, it will not make the entire network unable to work, but it will still affect the performance of the system. A RISC reduced instruction set computer is a microprocessor that executes fewer types of computer instructions, and the operating system uses the UNIX system. The hot-swap function allows users to replace faulty hard disks, boards and other components without cutting off the power supply. Non-uniform memory access (NUMA) technology combines symmetric multiprocessor (SMP) and cluster (Cluster) technology to obtain higher cost performance. So choose option A.

Question 6: In the following description about server technology, 错误的是( ).

A. Server disk performance is reflected in disk storage capacity and I/O speed

B. When a host in the cluster system fails, it will not affect the normal service of the system

C. Servers using RISC processors usually use UNIX operating systems

主背板D. The hot swap function allows users to replace hard drives, etc. without cutting off the power supply

Correct answer: D
Reference analysis:
[Analysis] The hot swap function allows users to replace faulty hard disks, boards and other components without cutting off the power supply. So choose option D.

Question 13: Which of the following descriptions about server technology is wrong ( ).

A. When a host in the cluster system fails, the system can provide normal services

B. In order to improve the performance of the network server, SMP, Cluster,PoE等技术

C. The operating system of servers using RISC structure processors usually uses Unix

D. The hot swap function allows users to replace hard disks, boards, etc. without cutting off the power supply

Correct answer: B
Reference analysis:
[Analysis] In order to improve the performance of network servers, various servers adopt different technologies in their design, mainly including symmetric multiprocessing (SMP) technology, cluster (Cluster) technology, non-uniform memory access (NUMA) technology, high-performance storage and intelligent I/O technology, service processor and Internet server control (ISC) technology, emergency management port (EMP) technology and hot-swap technology. So choose option B.

DNS server

Appropriate question style: Which of the following descriptions about the DNS server of the Windows 2003 system is correct

1. 动态更新Allow clients to dynamically update their resource records when changes occur.

2. The in the DNS server 根服务器is automatically added to the system without manual configuration by the administrator.

3. The host record refers to the duration 生存时间(TTL)that the record is queried by the client and placed in .缓存

4. DNS server configuration 主要参数(1) forward lookup domain (2) reverse lookup domain (3) resource record (4) forwarder

5. 转发器It is a DNS server (not a router) on the network, which is used for DNS query of external domain names (for forwarding DNS queries of external domain names to the DNS server).

6. It is used to resolve the IP address into a domain name, and the pointer record of the host can be manually反向查找区域 added in the reverse lookup area .

7. 正向查找区域It is used to resolve the domain name into an IP address, and automatically add the pointer record of the host to the forward lookup area.

8. The DNS server IP地址is not dynamically assigned by the DHCP server, and its IP address should be a statically set fixed address.

9. Commonly used in DNS servers 资源记录include: host address resource records; mail exchanger resource records; alias resource records (no FTP server records). 别名资源记录Used to map aliases to standard DNS domain names.

10. By default, DNS service is not installed in Windows 2003 system .

11. The DNS server is divided into three types of servers according to the level: root DNS server, top-level domain (TLD) server, and authoritative DNS server.

12. Commands: ipconfig displays the current TCP/IP network configuration; netstat displays the TCP/IP-based NeTBIOS statistics and connection information of the local computer and the remote computer; pathping sends the message to all the routers it passes through, and makes statistics according to the message returned by each hop; route displays or modifies the local IP routing table entry; use the nslookup command to test the forward and reverse lookup areas; use the ping command to test the forward lookup area.

Relevant real questions over the years

Question 1: For 频繁改变位置a DNS client that uses DHCP to obtain an IP address, 减少对其资源记录的手动管理the measures that can be taken are ( ).

A. Allow dynamic updates

B. Using Reverse Lookup Zones

C. Add an alias record

D. Set a smaller survival time

Correct answer: A
Reference resolution:
【Resolution】Dynamic update allows DNS clients to register and dynamically update their resource records with the DNS server whenever changes occur. It reduces the need for manual management of zone records and is suitable for DNS clients that frequently change locations and use DHCP to obtain IP addresses.

Question 3: A computer in the campus network can only use the IP address and cannot use the domain name to access an external server. The reason for this cannot be ( ).

A. The DNS server set by the computer does not provide normal domain name resolution service

B. The DNS server that provides name resolution of the accessed server is faulty

C. The computer is not in the same subnet as the DNS server

D. The access request initiated by the computer with the destination port 53 is restricted

Correct answer: C
Reference resolution:
[Resolution] This situation should be that the DNS server is faulty or the configuration is incorrect. It may be that the DNS server set by the computer does not provide normal domain name resolution service, or it may be that the DNS server that provides name resolution of the accessed server is faulty. Access requests with port number 53 are DNS access requests, and being restricted will also cause domain name resolution failures. If the computer and the DNS server are not in the same subnet, domain name resolution will not be affected.

Question 61: A computer in the campus network cannot use the domain name but can only use the IP address to access an external server. The reason for this may be ( ).

A. The computer gateway setting is wrong

B. The DNS server set on the accessed server is incorrect

C. The local domain name server cannot communicate with the outside world normally

D. The computer is not in the same subnet as the DNS server

Correct answer: C
Refer to analysis:
[Analysis] A computer in the campus network cannot use the domain name but can only use the P address to access an external server. The main possible reasons are: ①The TCP/IP
protocol of the computer is not working properly;
②The IP address and mask settings of the computer are wrong; ③The gateway
setting of the computer is wrong; The local host can access the external server through the IP address, indicating that the network is connected, and ①-④ can be ruled out. Therefore, choose option C.


Question 4: Among the following Windows commands, the command that can be used to check whether the DNS server configured on this machine works normally is ( ).

A、ipconfig

B、nbtstat

C、 pathping

D、route

Correct answer: C
Refer to analysis:
[Analysis] ipconfig displays the current TCP/IP network configuration; nbtstat displays the TCP/IP-based NeTBIOS statistics and connection information between the local computer and the remote computer; pathping sends the message to all the routers it passes through, and makes statistics according to the message returned by each hop; route displays or modifies the local P routing table entries.

Question 6: Among the following Windows 2003 system commands, which one can clear the DNS cache (DNS cache) is ().

A、nbtstat

B、 netstat

C、 nslookup

D、ipconfig

Correct answer: D
Reference resolution:
[Resolution] Executing the "IPconfig/flushdns" command can clear the DNS cache, and nbtstat can refresh the NetBIOS name cache and the names registered with Windows Internet Name Service. Netstat is used to display data related to IP, JCP, and UDP protocols, and is generally used to check the network connection of each port of the machine. Nslookup is a command to detect whether the DNS server in the network can correctly implement domain name resolution.

Question 29: In the following description about DNS server configuration and testing under Windows2003 system, the error is ( ).

A. Allow clients to dynamically update their resource records when changes occur

B. The root DNS server in the DNS server needs to be manually configured by the administrator

C. The forwarder is a DNS server on the network, which is used for DNS query of external domain names

D. Use the nslookup command to test forward and reverse lookup zones

Correct answer: B
Reference analysis:
[Analysis] In the Internet, there are 13 DNS servers (labeled A~M). When DNS servers are installed, these root DNS servers are automatically added to the system. Therefore, option B is wrong.

Question 31: The function of DNS forward search is to resolve the domain name to an IP address. The command to test this function in the Windows system is ( ).

A、nslookup

B、arp

C、 grid state

D、query

Correct answer: A
Reference analysis:
[Analysis]
1. The nslookup command is used to test the DNS server.
2. ARP (Address resolution protocol) is an address resolution protocol, which is mainly used to find the MAC address (that is, the hardware address).
3. netstat is a console command, which is a very useful tool for monitoring TCP/IP networks. It can display routing tables, actual network connections, and status information for each network interface device.
4. Query is the query command, which is mainly used to query the processes, users, sessions, etc. logged in the system. Option A is consistent with the meaning of the question, so choose A option.

Question 75: The forward lookup zone is used to resolve the domain name to an IP address. The command to test the domain name to IP address resolution function in the Windows system is ( ).

A、nslookup

B、hostname

C、route

D、ipconfig

Correct answer: A
Reference analysis:
[Analysis]
1. The nslookup command is used to monitor whether the DNS server in the network can correctly implement domain name resolution.
2. The hostname command is used to display the current hostname.
3. The route command is used to display or modify the entry information of the local IP routing table.
4. The ipconfig command is used to display the current TCP/IP network configuration information. So choose option A.

Question 9: 不属于The parameters of the DNS server under the following Windows 2003 system are ( ).

A. Scope

B. Resource records

C. Forward lookup area

D. Reverse lookup zone

Correct answer: A
Reference resolution:
[Resolution] The main parameters of DNS server configuration:
(1) 正向查找域(Map domain name to IP address database, used to resolve domain name to IP address).
(2) 反向查找域(Map IP address to domain name database for resolving IP address to domain name).
(3) 资源记录(a structured set of records in a zone, including host address resource records, mail exchanger resource records, and alias resource records).
(4) 转发器(The local DNS server is used to forward DNS queries for external DNS names to this DNS server). Therefore, option A is not a DNS server parameter.

Question 35: In the following description about DNS server under Windows 2003 system, the wrong one is ( ).

A. By default, DNS service is not installed in Windows 2003 system

B. You can manually increase the pointer record of the host in the reverse lookup area

C. In order to facilitate the use of the DNS server, a DHCP server can be used to dynamically assign an IP address to it

D. The basic configuration of the DNS server includes creating forward and reverse lookup zones, adding resource records, etc.

Correct answer: C
Reference resolution:
[Resolution] The IP address of the DNS server must be a fixed IP address, so option C is wrong, so choose option C.

Question 11: In the following description about DNS server parameters under Windows 2003 system, the error is ( ).

A. When installing the DNS service, the root server is automatically added to the system

B. The reverse lookup zone is used to resolve IP addresses into domain names

C. The TTL of the host record is the duration of the record being placed in the cache after being queried

D. Forwarders are used to query external domain names转发给内部DNS服务器

Correct answer: D
Reference resolution:
[Resolution] The forwarder is also a DNS server, which is used by the local DNS server for DNS queries of external DNS names 转发给该DNS服务器. Therefore, the correct answer to this question is D.

Question 14: Among the following descriptions about the DNS server under Windows 2003 system, the correct one is ( ).

A. The root DNS server in the DNS server需管理员手工配置

B. The survival time of the host record refers to the记录在服务器中存放的时间

C. Dynamic updates allow clients to dynamically update their resource records when changes occur

D. A forwarder is a router that forwards DNS queries to外部DNS服务器

Correct answer: C
Reference analysis:
[Analysis] There are 13 root DNS servers on the Internet, and 不需要在配置DNS服务器时管理员手工配置,the survival time of a host record refers to the record being queried by the client 存放在缓存中的持续时间. Dynamic update allows DNS clients to register and dynamically update their resource records with DNS servers at any time when changes occur. It reduces the need for manual management of zone records and is suitable for DNS clients that frequently change locations and use DHCP to obtain IP addresses. Forwarders are also DNS servers, which are local DNS servers used to forward DNS queries for external DNS names 转发给该DNS服务器. So choose option C.

Question 44: In the following description about DNS server configuration and testing under Windows2003 system, 正确的是( ).

A. The forwarder is a DNS server on the network, which is used for 内部DNS query of domain names

B. The root DNS server in the DNS server does not need to be manually configured by the administrator

C. The survival time of the host record refers to the 服务器中storage time of the record

D. Use ping命令can test forward and reverse lookup zones

Correct answer: B
Reference resolution:
[Resolution] The forwarder is also a DNS server, which is used by the local DNS server to forward the DNS query of the external DNS name to the DNS server. The survival time of the host record refers to the duration of the record being queried by the client and stored in the cache (for future use). The default value is 3600 seconds. Forward and reverse lookup zones can be tested using the nslookup command. So choose option B.

The DNS server can be tested using nslookup (both forward and reverse) and ping (only forward). When the corresponding content is parsed, it means that the parsing is successful.

Question 51: In the following description about DNS server configuration and testing under Windows 2003 system, the error is ( ).

A. The forwarder is used for DNS query of external domain names

B. The root DNS server in the DNS server needs to be manually configured by the administrator

C. The survival time of the host record is the time when the record is stored in the cache after being queried by the client

D. Use the ping command to test the forward lookup area

Correct answer: B
Reference analysis:
[Analysis] There are 13 root DNS servers (labeled a to m) on the Internet, most of which are located in North America. When root servers are installed, these root DNS servers are automatically added to the system. So choose option B.

Question 47: In the following description about DNS server installation and configuration under Windows2003 system, the error is ( ).

A. By default, the DNS service is not installed in the Windows2003 system

B. In the pointer record 正向查找区域that can 手工increase the host

C. The root DNS server in the DNS server does not need to be manually configured by the administrator

D. The forwarder is a DNS server on the network, which is used for DNS query of external domain names

Correct answer: B
Reference analysis:
[Analysis] The pointer record of the host is automatically added in the forward lookup area, and the pointer record of the host can be added manually in the reverse lookup area.

Question 53: In the following description about the installation and configuration of the Windows 2003 system DNS server, the error is ( ).

A. By default, Windows 2003 system 已安装DNS service

B. The forward lookup zone is used to resolve domain names into IP addresses

C. You can manually increase the pointer record of the host in the reverse lookup area

D. Dynamic updates allow clients to dynamically update their resource records when changes occur

Correct answer: A
Reference resolution:
[Resolution]
By default, the Windows 2003 system does not install the DNS service, which needs to be added manually. So choose option A.

Question 60: Among the following options, which one belongs to the authoritative server is ( ).
I.com II.gov Ill abc.com IV x.abc.com
A. I and II
B, III and IV
C, III
D, IV

Correct answer: B
Reference resolution:
【Resolution】Authoritative DNS server Every organizational structure with publicly accessible hosts on the Internet (such as www servers and FTP servers) must provide publicly accessible DNS records. I and IV are website names belonging to the www server, so they also belong to the authoritative DNS server. and I belong to top-level domain servers. So choose option B.

Question 49: Among the following options, which one can be configured in the DNS server of the Windows 2003 system is ( ).

A. Root DNS server

B. Top-level domain (TLD) server

C. Authoritative DNS server

D. DNS forwarder

Correct answer:
Refer to Analysis:
[Analysis]
DNS servers can be divided into three levels: root DNS server, top-level domain (TLD) server, and authoritative DNS server.
The main parameters of DNS server configuration: forward lookup zone, reverse lookup zone, resource record, forwarder. So choose option D.

Question 59: In the following description about the main configuration parameters of DNS server under Windows 2003 system, the wrong one is ( ).

A. The forward lookup zone is used to resolve domain names into IP addresses

B. The reverse lookup zone is used to resolve IP addresses into domain names

C. Alias ​​resource records in resource records are used to map aliases to standard DNS domain names

D, 转发器是网络上的路由器, used to forward DNS queries for external domain names

Correct answer: D
Refer to resolution:
【Resolution】转发器也是一个DNS服务器, which is used by the local DNS server to forward the DNS query of the external DNS name to the DNS server. So choose option D.

Question 43: In the following description about DNS server configuration under Windows 2003 system, the error is ( ).

A. The interface option can choose which interfaces to listen to DNS query requests

B. The root DNS server in the DNS server does not need to be manually configured by the administrator

C. The survival time of the host record refers to the time when the record is stored in the server

D. Forwarders are DNS servers on the network, used for DNS queries of external domain names

Correct answer: C
Reference analysis:
[Analysis] The survival time of the host record refers to the duration of the record being queried by the client and stored in the cache (for future use). The default value is 3600 seconds.

Question 21: Add a resource record to the DNS server of the Windows 2003 system, as shown in the figure below. Among the following descriptions about this resource record, the correct one is ( ).

insert image description here

The resource record created by I is a mail exchanger record.
II When creating this record, create a corresponding pointer record in the reverse lookup area.
III When this record is queried by a client, it will be stored in the cache for 3600 seconds.

A, I, II

B. Only I, III

C, only II, III

D、I、Ⅱ、Ⅲ

Correct answer: C
Reference resolution:
In the [Resolution] dialog box, check the Create related pointer (PTR) record, add the DNS record mai.aaa.com, and set the time to live (TTL) to one hour, that is, 3600 seconds. Therefore, the expressions of Ⅱ and Ⅲ are correct, therefore, the answer is C.

Question 25: In the DNS server, 不包含the resource record is ( ).

A. Host address (A) resource record

B. Alias ​​(CNAME) record

C. FTP server records

D. Mail Exchanger (MX) records

Correct answer: C
Reference resolution:
[Resolution] In the DNS server, resource records refer to a group of structured records in the zone.
常用的资源记录包括:
1. 主机地址资源记录, which maps DNS domain names to IP addresses;
2. 邮件交换器资源记录, which provides mail routing for mail exchanger hosts;
3. 别名资源记录which maps aliases to standard DNS domain names.
There is no "FTP server" resource record in the DNS server.

Question 56: When the DNS client performs domain name resolution, the first query in the following records is ( ).

A. The cache of the local DNS server

B. The client's cache

C. Resource records of the local DNS server

D. Resource records of authoritative DNS servers

Correct answer: B
Refer to resolution:
B [Resolution] The working principle of the DNS system is:
when a DNS client is about to resolve a domain name, it first queries the cache of the client. If there is no record that meets the conditions, it generates a query request and sends it to the local DNS server. After receiving the query request, the DNS server searches the resource records of the server. Set to forward the query request to other DNS servers for query; if the client does not receive a query response within the specified time, it will try other DNS servers or query again. So choose option B.

Question 66: The command that can test the IP address to domain name resolution function in the Windows system is ( ).

A、net view

B、netstat-n

C、tracert-d

D、nslookup

Correct answer: D
Reference analysis:
[Analysis] net view: display domain list, computer list or list of shared resources on the specified computer. The netstat command displays active TCP connections, listening ports, Ethernet statistics, IP routing table, and IP statistics. Tracert detects the path to the destination computer by sending ICMP packets with different TTLs and listening for response packets. Nslookup is a tool for querying Internet domain name information or diagnosing DNS server problems. So choose option D.

Question 85: In Windows 2003, the command used to display the domain list and computer list is ( ).

A、ipconfig

B、nbtstat-a

C、net view

D、nslookup

Correct answer: C
Reference analysis:
[Analysis]
1. The ipconfig command is used to display the current TCP/IP network configuration information.
2. The Nbtstat-a command is used to list the name table of the remote computer with the specified name.
3. The nslookup command is used to monitor whether the DNS server in the network can correctly implement domain name resolution.
4. The net view command is used to display a list of domains, a list of computers, or a list of shared resources on a specified computer.
So choose option C.

Question 87: The forward lookup zone is used to resolve the domain name to an IP address. The command to test the domain name to IP address resolution function in the Windows system is ( ).

A、tracert

B、hostname

C、 route

D、ipconfig

Correct answer: A
Reference analysis:
[Analysis]
1. The nslookup command is used to monitor whether the DNS server in the network can correctly implement domain name resolution.
2. The hostname command is used to display the current host name.
3. The route command is used to display or modify the entry information of the local IP routing table.
4. The ipconfig command is used to display the current TCP/IP network configuration information.
So choose option A.

Question 72: Among the following commands, the command to view the DNS server address information obtained by the DHCP client is ( ).

A、ipconfig /displaydns

B、ipconfig /renew

C、ipconfig /flushdns

D、ipconfig /all

Correct answer: D
Reference analysis:
[Analysis]
1. The ipconfig/displaydns command can query all cache information of the client DNS.
2. The ipconfig/renew command can obtain a new address lease from the DHCP server again.
3. The ipconfig/flushdns command can refresh the DNS cache.
4. The ipconfig/all command can check the address lease obtained by the client and other configuration information.
So choose option D.

www server

Appropriate question style: Among the following descriptions about www server configuration under Windows 2003 system, which one is correct

1. The Web site can configure static and dynamic IP addresses.

2. When setting up a Web site, you must specify a main directory for the site (not necessarily on the local computer/server), or a virtual subdirectory.

3. When setting up a Web site, it is not possible to access the default document of the site. If the default page is set, the default page such as default. html will be opened directly (automatically) when visiting. If no default content document is set, you need to provide the file name of the home page content when visiting the site.

4. You can use the domain name of the site or the IP address of the site when accessing the Web site.

5. Performance options include attributes that affect bandwidth usage, the number of client web connections (not including timeout). In the website performance option, the bandwidth limit option limits the available bandwidth of the website; the website connection option can set the number of client web connections.

6. In the main directory tab, you can configure the read and write permissions of the main directory, and you can set the file path for storing web pages.

7. In the directory security tab, you can choose to configure three methods: authentication and access control, IP address and domain name restriction, and secure communication. (The access rights of the main directory cannot be configured)

8. Website options include the identification of the website, setting the connection limit of the website, the timeout time of the website connection, enabling logging and configuring the logging format of the website. The connection timeout option of the website refers to the maintenance time of the HTTP connection. A website's bandwidth options can limit the network bandwidth available to that website.

9. As network identifiers, there are IP address, non-TCP port number, host header, and website description. (no home directory)

10. Adding the operating system component IIS to Windows 2003 can realize Web service, which must be installed before building a Web site.

11. Web sites can dynamically obtain IP addresses. Multiple websites can be built on one server.

12. By default, DNS service is not installed in Windows 2003 system.

Relevant real questions over the years

Question 1: Which of the following descriptions about www server configuration under Windows 2003 is correct ( ).

A. In the website performance options, the bandwidth limit option limits the available bandwidth of the website

B. In the website performance option, the website connection option can 访问列表limit the client by setting

C. When building a Web site, a home directory must be specified for the site, but 不能是the virtual directory

D. When setting up the Web site, if the default page is set, the default.html page 不输入will be displayed when visiting直接打开

Correct answer: A
Reference analysis:
【Analysis】
A In the website performance options, the bandwidth limit option limits the available bandwidth of the website to control the traffic allowed by the website. In the website performance option, the website connection option can set the number of client web connections.
B does not specify what function to limit the client, and it is not limited by access list, but by 通过微调框.
When building a Web site, you must specify a main directory for each site, and it can also be a virtual subdirectory, so C is wrong. When setting up a Web site, only when the default page is set, the default page such as default.html will be opened directly when visiting. If the default page is not set, you need to provide the file name of the homepage content when visiting the site, so D is wrong. In summary, option A is correct.

Question 2: In the following description about www server under Windows 2003 system, the wrong one is ( ).

A. The website must set the default document of the website before it can be accessed.
B. When establishing the website, a home directory must be specified for the website.
C. The connection timeout option of the website refers to the retention time of the HTTP connection.
D. The bandwidth option of the website can limit the network bandwidth that the website can use

Correct answer: A
Reference analysis:
[Analysis] The bandwidth option is a check box in the performance tab. The original text in the book is called the bandwidth limit option. The bandwidth option and the bandwidth limit option are synonyms and can be interchanged, so option D is correct. When the Web site does not set a default content document, the file name of the home page content should be provided when accessing the site, and the site can still be accessed. So item A is wrong.

Question 3: In the following description about www server configuration under Windows 2003 system, 错误的是( ).

A. After setting the default document, the webpage can be opened automatically when using the browser to visit the website

B. The website option can set the logo of the website and enable logging

C. Directory security options can choose to configure authentication and access control, IP address and domain name restrictions, and secure communication

D. Performance options can set properties that affect bandwidth usage and the number of client web connections和超时时间

Correct answer: D
Refer to Analysis:
[Analysis]
In the Performance tab, you can set properties that affect bandwidth usage and the number of client web connections 但不包括超时时间,超时时间由网站选项设置. So the correct answer to this question is D

Question 4: Among the following descriptions about www server under Windows 2003 system, the correct one is ( ).

A. Web site必须配置静态IP地址

B. When visiting a Web site必须使用该站点的域名

C. When building a Web site, a home directory must be specified for the site

D, The performance options of the Web site include bandwidth limiting properties and客户端连接时间限制属性

Correct answer: C
Reference analysis:
[Analysis]
The website can be configured with a static IP address or a dynamic IP address. When accessing a Web site, you can use the domain name of the site, or you can use the IP address of the site. The same server can build multiple websites, and each website corresponds to a directory on the server. When building a Web site, a main directory must be specified for the site, and it can also be a virtual subdirectory. Performance options for Web sites include properties that affect bandwidth usage and 客户端Web连接的数量. Therefore option C is correct.

Question 6: When configuring the www server of the Windows 2003 system, the following options are in 不能作为网站标识的是( ).

A. Main directory

B. IP address

C. Non-TCP port number

D. Host head

Correct answer: A
Reference analysis:
[Analysis]
When configuring a unique identifier for each site on the server, there are three parts as the network identifier: IP address, non-standard TCP port number, and host header name. When creating different web servers, different port numbers, different IP addresses and different host headers can be used to achieve this, so the answer to this question is A.

Question 7: In the following description about the installation and configuration of www server under Windows2003 system, 错误的是( ).

A. Multiple websites can be built on one server

B. Adding the operating system component IIS to Windows 2003 can realize Web service

C. In the main directory tab of the website, you can configure the read and write permissions of the main directory

D. The Web site must be configured with a static IP address

Correct answer: D
Refer to analysis:
[Analysis]
When the WwW server has multiple network cards and each network card is configured with an IP address, or the same network card is configured with multiple IP addresses, and in the [Website] tab of a certain website, the [IP address] drop-down list box remains at the default value "All Unassigned", the website will respond to all IP addresses that are allocated to the server but not to other sites. Therefore, option D is wrong.

Question 11: In the following description about www server configuration under Windows 2003 system, 错误的是( ).

A. Directory security options are configurable主目录的访问权限

B. The website option can set the logo of the website and the connection limit of the website

C. In the main directory tab, you can set the file path for storing web pages

D. Performance options can set properties that affect bandwidth usage and the number of client web connections

Correct answer: A
Reference analysis:
[Analysis] There are three ways
to configure the directory security tab in the www server configuration under Windows 2003 system 身份验证和访问控制、IP地址和域名限制、安全通信. So choose option A.

Question 12: In the configuration of the www server under the Windows2003 system, what is not a website option is ( ).

A. Website logo

B. Website connection timeout

C. Authentication and access control

D. Whether to enable logging

Correct answer: C
Reference analysis:
[Analysis]
In the configuration of the www server under Windows 2003 system, the website options include the logo of the website, setting the connection limit of the website, enabling logging and configuring the logging format of the website. Authentication and access control are part of the directory security options. So choose option C.

Question 13: In the following description about the configuration and use of www server under Windows2003 system, the error is ().
A. Multiple websites can be built on one server

B. The domain name or IP address of the site can be used when accessing the Web site

C. When building a Web site, the main directory specified for the site必须在本地计算机

D. If the Web site has set a default content document, you only need to provide the domain name of the site when accessing the site

Correct answer: C
Reference analysis:
[Analysis] When building a Web site, the main directory specified for the site can be a directory on the local computer, a share on another computer, or redirect to a certain address.

Question 14: In the following description about the www server configuration of the Windows 2003 system, 错误的是( ).

A. When building a Web site, a home directory must be specified for the site

B. Web site必须设置默认的网站文档才能被访问

C. The file path for storing web pages can be set in the main directory tab, which can be a virtual subdirectory

D. Performance options can set properties that affect bandwidth usage and the number of client web connections

Correct answer: B
Reference analysis:
[Analysis]
If the default content document is not set, the file name of the homepage content should be provided when accessing the site, for example, you can enter: http://192.168.0.37/index.html in the address bar of the browser. At this time, the Web site can be accessed without setting the default Web site document. So choose option B.

Question 15: In the following description about the installation, configuration and use of the Windows 2003 system www server, the error is ( ).

A. By default, Windows 2003 system 已安装DNS service

B. When building a Web site, a home directory must be specified for the site

C. If the website does not set a default website document, you must enter the file name of the home page content when accessing the site

D. The directory security option of the Web site is used to confirm the user's identity before authorizing access to restricted content

Correct answer: A
Reference resolution:
[Resolution] By default, the Windows 2003 system does not have DNS service installed. So choose option A.

Question 16: The logo of the website can be set in the WwW server website option of the Windows 2003 system, and 不能the configuration in the website logo in the following options is ( ).

A. Description

B、 IP

C. TCP port

D. The host header of the website

Correct answer: D
Reference analysis:
[Analysis]
In the WwW server website option of Windows 2003 system, the logo of the website includes: description, IP address, TCP port number.
So choose option D.

Question 17: In the following description about www server configuration under Windows 2003 system, the error is ().

A. The logo of the website can be set in the website option

B. 网站选项中Website can be set up连接数量限制

C. In the website option, you can set the timeout period of the website connection

D. Logging can be enabled in the website options

Correct answer: B
Reference analysis:
[Analysis]
In the www server configuration, 性能选项the website can be set in 连接数量限制.
So choose option B.

Question 18: In the following description about the configuration and use of www server under Windows 2003 system, 错误的是( ).

A. When building a Web site, you can set the main directory of the site in the main directory tab

B. The access rights of the main directory include reading, writing and directory browsing, etc.

C. In the document tab, you can set the default access document of the site

D. User 无法访问未设置默认网站文档's website

Correct answer: D
Reference analysis:
[Analysis]
Users can access the website of the default website document by accessing the IP address of the www server.
So choose option D.

FTP server

Appropriate question style: In the following description about Serv_U FTP server configuration, the correct one is

1. 初始状态下If no administrator password is set, you can directly enter the Serv-U management program.

2. The FTP server 缺省端口号is 21 , but sometimes port 21 cannot be used for some reason, but other suitable port numbers can be selected.

3. The FTP server can use a dynamic IP address. When using 动态 IP 地址, the server IP address should be configured as empty , which means all IP addresses. When the server has multiple IP addresses, it is more convenient to leave the IP address empty (no need to add them separately, empty is not 0.0.0.0).

4. The server can build multiple virtual servers identified by IP address and port number, and each virtual server (domain) is uniquely identified by IP address and port number instead of relying solely on IP address.

5. Add "anonymous" to the server, and the system will automatically determine it as an anonymous user. Instead of 创建新域automatically adding an "anonymous" anonymous.

6. Server 最大用户数refers to the maximum number of users allowed by the server to be online at the same time.

7. The user 上传下载选项requires the FTP client to upload files while downloading information. (not to configure the user's upload and download rates).

8. The server option does not provide "IP access option". "User Home Directory" is not included in the user general options.

9. 域存储位置When configuring, small domains should choose INI file storage and large domains should choose registry storage.

10. 服务器域名When configuring, you can use a domain name or other description. (It is not necessary to use the domain name of the server, it does not have to be a qualified domain name)

11. Users with administrator operation rights are required to be in the Serv-U FTP server 注册用户. (Users cannot register new users in the server by themselves)

12. After the domain of the FTP server is created, users need to be added to be accessed by the client. Users include anonymous users and named users . When adding an anonymous user, the user name must be "anonymous". If an anonymous user is added, the system will not ask for a password.

13. In Serv-U, the option to limit the storage space occupied by user name upload information is the user quota option.

14. The server can build multiple virtual servers identified by IP addresses and port numbers.

15. The maximum upload or download speed of the Serv-U FTP server refers to the bandwidth occupied by the entire server.

16. After choosing to intercept "FTP BOUNCE" and FXP, it is not allowed to transfer files between two FTP servers

17. For a domain with more than 500 users, storing the domain in the registry can provide higher performance.

18. In addition to using a dedicated client, such as cuteFTP, to access the FTP server, you can also use a browser.

19. Check the anonymous user password option means that the email address must be used as the login password when logging in as an anonymous user.

Relevant real questions over the years

Question 1: Among the following descriptions about Serv-U FTP server configuration management, the correct one is ( ).

A. In the initial state, the server 管理员密码is "admin"

B. Domain port number 缺省为21, any value between 0-65535 can also be used

C. When creating a new domain, the anonymous user "anonymous" will自动加入到服务器中

D. When configuring the IP address of the server, if it is empty, it represents all the IP addresses of the server

Correct answer: D
Reference analysis:
[Analysis]
In the initial state 没有设置管理员密码, you can directly enter the Serv-U management program to set or change the administrator password. FTP服务器缺省端口号为21,但是有时因为某种原因则不能使用21号端口, but a selected port number can be set. If you create a new domain, when adding users, the user name is "anonymous" 被系统自动判定为匿名用户. When configuring the IP address of the server, if it is empty, it represents all IP addresses of the server. In summary, item D above is correct.

Question 2: In the following description about Serv-U FTP server configuration, 错误的是( ).

A. Each virtual server in the Serv-U FTP server由IP 地址唯一识别

B. The maximum number of users in the Serv-U FTP server refers to the number of users who are online at the same time

C. The maximum upload or download speed of the Serv-U FTP server refers to the bandwidth occupied by the entire server

D. When configuring the domain port number of the server, you can use port 21 or choose other appropriate ports

Correct answer: A
Reference analysis:
[Analysis]
Each virtual server in the Serv-U FTP server is uniquely identified by its IP address and port number, not by just one IP address.

Question 3: Among the following Serv-U FTP server options, the one that does not provide "IP access option" is ( ).

A. Server options

B. Domain Options

C. Group options

D. user

Option Correct answer: A
Reference analysis:
[Analysis]
The main parameters of the FTP server configuration are as follows.
(1) Server options can set the following items: maximum upload speed and maximum download speed, maximum number of users, check anonymous user passwords, delete some uploaded files, disable anti-timeout scheduling, and block FTP_BONCE attacks, etc.
(2) Domain option: In the Serv UFTP server, multiple virtual servers can be constructed, and each virtual server is called a domain, and a domain is uniquely identified by an IP address and a port number. The options include domain general options, domain virtual path options, domain IP access options, domain message options, domain record options, and domain upload/download rate options.
(3) User options include user account options, user directory access options, user IP options and user quota options.
(4) Group options include account options, directory access options and IP access options. To sum up, option A does not provide an IP access option.

Question 4: In the following description about Serv-U FTP server configuration, the error is ( ).

A. When configuring the server domain name, you can use the domain name or other descriptions

B. When configuring the server IP address, the server has multiple IP addresses that need to be added separately

C. When configuring the server domain port number, you can use port 21 or other appropriate port numbers

D. When configuring the domain storage location, the small domain should choose the .INI file storage and the large domain should choose the registry storage

Correct answer: B
Refer to analysis:
[Analysis]
Serv-UFTP server is a widely used FTP server software that supports all Windows series such as 3x/9x/ME/NT/2K. It has very complete security features, supports SSL FTP transmission, and supports multiple Serv-U and FTP clients to protect your data security through SSL encrypted connections, etc. When setting the IP address of the FTP server, the IP address can be empty, which means all the IP addresses of the server. When the server has multiple IP addresses or uses a dynamic IP address, it is more convenient to leave the IP address empty. Therefore, the correct answer to this question is B.

Question 5: Among the following descriptions about Serv_U FTP server, the correct one is ()

A. Each virtual server in the server is called a domain, and a domain is uniquely identified by an IP address

B. The anonymous user "anonymous" in the server is automatically added by the server

C. In the general server options, the maximum number of users refers to the number of users who are online at the same time

D. The user upload/download rate option is to configure the user's upload and download rate

Correct answer: C
Reference analysis:
[Analysis]
In the Serv_U FTP server, multiple virtual servers can be constructed, called domains, which are uniquely identified by IP addresses and port numbers.
When creating a new domain and adding users, enter anonymous in the user name text box, and the system will automatically identify anonymous users.
The maximum number of users of the server refers to the maximum number of users that the server allows to be online at the same time. The user upload/download rate option requires the FTP client to upload files as well as download information.
Therefore option C is correct.

Question 6: Among the following descriptions about Serv_U FTP server configuration, the correct one is ( ).

A. Users can register new users in the server by themselves

B. When configuring the domain name of the server, the domain name of the server must be used

C. When configuring the IP address of the server, if the server has multiple IP addresses, they need to be added separately

D. When adding a user named "anonymous", the system will automatically determine it as an anonymous user

Correct answer:
D Reference analysis:
[Analysis] The addition and registration of new users must be operated by the administrator, and cannot be operated by themselves, so option A is wrong. When configuring the server domain name, you can use the domain name or other descriptions, so option B is wrong. The server IP address can be empty. When the server has multiple IP addresses or uses a dynamic IP address, it is more convenient to leave the IP address empty, so item C is wrong. When adding a user named "anonymous", the system will automatically determine it as an anonymous user. Therefore option D is correct.

Question 11: In the following description about the installation and configuration of the Serv-U FTP server, 错误的是( ).

A. The domain name entered when creating a new domain does not have to be a qualified domain name

自行B. Users can register new users in the FTP server

C. After choosing to intercept "FTP BOUNCE" and FXP, it is not allowed to transfer files between two FTP servers

D. When adding a user, if the user name is "anonymous", the system will automatically determine it as an anonymous user

Correct answer: B
Reference analysis:
[Analysis]
After the domain of the Serv-U FTP server is created, users need to be added to be accessed by the client. 需要拥有管理员操作权限的用户,才能在Serv-U FTP服务器中注册用户. Therefore, option B is wrong.

Question 15: Among the following descriptions about Serv_U FTP server, the correct one is ().

A. The domain name entered when creating a new domain must be a qualified domain name

B. When adding an anonymous user, the user name must be "anonymous"

C. Users can register new users in the server by themselves

D. The FTP server cannot be accessed using a browser

Correct answer: B
Reference analysis:
[Analysis]
The domain name of the FTP server can be arbitrary. Server users include anonymous users and named users, both types of users must be manually added by the administrator. In addition to using a dedicated client, such as cuteFTP, to access the FTP server, you can also use a browser. So choose option B.

Question 14: In the following description about Serv_U FTP server, 错误的是( ).

A. The FTP server can use a dynamic IP address

B. After the domain of the FTP server is created, the client即可使用匿名用户访问

C. For domains with more than 500 users, storing domains in the registry can provide higher performance

D. Restricting whether certain IP addresses can access the FTP server can be realized by setting IP access

Correct answer: B
Reference analysis:
[Analysis] The domain of the FTP server 创建完成后需要添加用户,才能被客户端访问. Users include anonymous users and named users, so option B is wrong, so choose option B.

Question 16: Which of the following descriptions about the Serv-U FTP server is correct ( )

A. The named user must set a password

B. The FTP server cannot use a dynamic IP address

C. Anonymous user "anonymous" is automatically added by the server

D. The server can build multiple virtual servers identified by IP address and port number

Correct answer: D
Reference analysis:
[Analysis]
The Serv-U FTP server can set a fixed IP address, or not specify an IP address, and use a dynamic IP address. The server can build multiple virtual servers identified by IP address and port number. After the Serv-U FTP server is created, users need to be added before it can be accessed by the client. User names include anonymous users.

Question 17: In the following description about the installation and configuration of the Serv_U FTP server, 错误的是( ).

A. The maximum number of users in the server option refers to the maximum number of users who are online at the same time

B. When adding a user named "anonymous", the system will automatically determine it as an anonymous user

C. Each virtual server in the Serv_UFTP server is uniquely identified by its IP address and port number

D. If the server is set to check the anonymous user password, when logging in with the anonymous user需输入匿名用户密码

Correct answer: D
Refer to Analysis:
[Analysis] 如果添加的是匿名用户,系统将不会要求输入密码. When checking the anonymous user password, use the email address as the login password when using the anonymous user to log in to the server.

Question 34: In the following description about Serv_U FTP server configuration, the error is ( )

A. When the FTP server uses a dynamic IP address, the server IP address does not need to be entered

B. In the New User menu, you can choose 创建to name the user or匿名用户

C. For domains with more than 500 users, storing domains in the registry can provide higher performance

D. In the general server options, the maximum number of users refers to the number of users who are online at the same time

Correct answer: B
Reference analysis:
[Analysis]
In the menu of creating a new user, 在用户名称文本对话框中输入“anonymous",系统会自动判定为匿名用户,将不会要求输入密码而直接要求输入主目录. So choose option B.

Question 19: Serv_U ( ) is not included in the general user options of the FTP server.

A. Maximum upload speed
B. Maximum download speed
C. Idle timeout
D. User home directory

Correct answer: D
Reference analysis:
[Analysis]
The general user options of the Serv_UFTP server include 最大上传速度和最大下载速度、最大用户数量、检查匿名用户密码、删除部分已上传的文件、禁用反超时时间调度、空闲超时时间、拦截FTP_BOUNCE攻击和FXP. So choose option D.

Question 29: In the process of entering ftp://ftp.abc.com.cn in the address bar of the browser to access the FTP server, the following protocol 未使用是( ).

A、IP

B、TCP

C、UDP

D、HTTP

Correct answer: D
Reference analysis:
[Analysis]
The HTTP protocol is a hypertext transfer protocol, which is used to transmit information between browsers and servers. So choose option D.

Question 31: In the following description about FTP, the wrong one is ( ).

A. Anonymous FTP service can provide information for free download

B. Use FTP to transfer any type of file, including text files and binary files, etc.

C. When transferring files, a data connection and a control connection must be established between the FTP client and the server

D. The control connection is actively established by the FTP server

Correct answer: D
Reference analysis:
[Analysis]
The control connection is set by the user in the FTP server. So choose option D.

Question 35: In the following description about the FTP server, 错误的是( ).

A. Use FTP to transfer any type of file

B. A control connection and a data connection should be established between the FTP client and the server

C. The control connection is established by the client, and the default port of the server is 21

D. The data connection is established by the server, and the default port on the server side is22

Correct answer: D
Reference analysis:
[Analysis]
The data connection is established by the server, and the default port on the server side is 20.

Question 36: In the following description about the configuration and use of Serv_U FTP server, the error is ( ).

A. When the FTP server uses a dynamic IP address, the server IP address does not need to be entered

B. Anonymous users of the FTP server are added by the administrator

C. For domains with more than 500 users, storing domains in the registry can provide higher performance

D. In the general options of the server, the maximum number of users refers to 可添加的the number of users in the server

Correct answer: D
Refer to Analysis
[Analysis]
In the general options of the server, the maximum number of users refers to 可被访问的the maximum number of users in the server

Question 39: It is ( ) 不能for 测试FTP服务器whether it works normally.

A. Use a browser

B. useping命令

C. Use FTP client software

D. Use the telnet command

Correct answer: B
Reference analysis:
[Analysis]
The main function of the ping command is to check the connection with the remote or local computer by sending ICMP messages and listening to the response messages. So choose option B.

Question 42: Among the following descriptions about Serv_U FTP server configuration, the correct one is ().

A. Users can register new users in the FTP server by themselves

B. The domain name entered when creating a new domain is the descriptive name of the server

C. After the domain of the FTP server is created, anonymous users will be automatically added

D. When configuring the IP address of the server, the server has multiple IP addresses that must be added separately

Correct answer:
Refer to Resolution: B
[Resolution]
The domain name entered when adding a new domain can be a qualified domain name or any other description. In user management, users 只允许由管理员添加新用户can only be accessed by the client after adding users. Users include anonymous users and named users. When the user name is "anonymous", it will be 自动判定为anonymous by the system. 服务器IP地址可为空, when the server has multiple IP addresses or uses a dynamic IP address, it is more convenient to leave the IP address empty. So choose option B.

Question 43: Among the following options, which one can be used to test whether the FTP server works normally is ( ).

A. Use SecureCRT

B. Use the hostname command

C. Use the ipconfig command

D. Use the tracert command

Correct answer: A
Reference analysis:
[Analysis]
1. The SecureCRT command is used to test whether the FTP server works normally.
2. The hostname command is used to display the current host name.
3. The ipconfig command is used to display the current TCP/IP network configuration information.
4. The tracert command detects the path to the destination computer by sending ICMP messages containing different TTLs and listening to the response messages. So choose option A.

Question 45: Among the following descriptions about Serv_U FTP server configuration, the correct one is ( ).

A. In the FTP server domain (general) option, the maximum upload/download rate can be configured

B. The FTP server must have multiple IP addresses分别添加

C. Anonymous users of the FTP server are assigned by the server自动添加

D. When the FTP server uses a dynamic IP address, the server IP address input is empty

Correct answer: D
Reference analysis:
[Analysis] The FTP server address is empty, which means all the IP addresses of the server. When the server has multiple IP addresses or uses a dynamic IP address, the IP address is generally set to be empty. So choose option D.

Mail (Winmail mail server)

Appropriate question style: Among the following descriptions about the Winmail mail server, the correct one is

1. The Winmail mail server supports 基于 Web 方式access and management, so IIS must be installed before installing the mail server software.

2. The Winmail mail server allows the user 自行注册新邮箱to enter the mailbox name, password and other information, but the domain name is fixed by the server and cannot be set by itself. But Winmai1 users cannot use Outlook to register new mailboxes by themselves.

3. In Winmail 快速设置向导(not system settings) 创建新用户, enter the information of the newly created user, including user name, domain name and user password (not the system mailbox password, administrator password), and you can choose whether to allow customers to register new mailboxes through Winmail.

4. At this time, it is necessary to establish this and (both are indispensable) 建立邮件路由in the DNS server .邮件服务器主机记录邮件交换器记录

5. 发送邮件时Usually adopted SMTP协议, 接收/读取邮件when usually adopted or . It will be used by Winmai1 users to view emails with a browser . CMIP is not an email system protocol.POP3
IMAP协议HTTP协议

6. The configuration of mail exchanger records can only be done on the server, not through the browser.

7. 管理工具Including system settings, domain name settings, user and group settings, system status and system logs and other items. (excluding mail management)

8. In 域名设置中(not system settings), you can add new domains, use 构建虚拟邮件服务器and delete existing domains. The domain name setting is an option to set whether the Winmail mail server allows new users to be registered by itself.

9. 系统设置Including SMTP settings, mail filtering, changing administrator password, etc. (no domain name setting).

10. Client software such as Outlook can only access Winmail mail server and 不能管理Winmail mail server.

insert image description here

Relevant real questions over the years

Question 1: In the following description about Winmail mail server configuration management, 错误的是( ).

A. Winmail mail server supports web-based access and management

B. In the domain name settings, the parameters of the domain can be modified, including adding new domains, deleting existing domains, etc.

C. You 系统设置中can modify the system parameters of the mail server, including whether to allow self-registering new users, etc.

D. When establishing mail routing, it is necessary to establish mail server host records and mail exchanger records in the DNS server

Correct answer: C
Reference analysis:
[Analysis]
Winmail mail server supports web-based access and management, so IIS must be installed before installing mail server software, item A is correct.
In the domain name settings, the parameters of the domain can be modified, new domains can be added, existing domains can be deleted, etc., item B is correct.
In the system settings, the system parameters of the mail server can be modified, including SMTP, mail filtering, changing the administrator password, etc., which 快速设置向导can be set in 是否允许自行注册新用户, so C is wrong. When establishing mail routing, it is necessary to establish mail server host records and mail exchanger records in the DNS server, and item D is correct.

Question 2: In the following description about the Winmail mail server creating a new mailbox [email protected] in the Quick Setup Wizard, the error is ( ).

A. You need to enter your email address

B. You need to enter the password of the system mailbox

C. The system automatically creates a domain named mail.abc.com

D. You can choose whether to allow yourself to register a new mailbox

Correct answer: B
Refer to analysis:
[Analysis]
When creating a new user in the Winmail Quick Setup Wizard, enter the information of the new user, including user name, domain name and user password ( ) 不是系统邮箱的密码, the system will automatically create a domain named mail.abc.com in addition to creating a mailbox user [email protected] mailto:user [email protected] , and you can choose whether to allow customers to register new mailboxes through Winmail. So choose option B.

Question 8: If the user's mailbox in the Winmail mail server is [email protected], then the correct one in the following description is ( ).

A. The Winmail mail server does not allow users to register new mailboxes by themselves

B. When sending an email to this user, the receiving mail server will store the received email in the mailbox corresponding to user1

C. When sending mail to this user, the sender's mail server uses the IMAP protocol to send mail to mail.abc.com

D. When establishing mail routing, you only need to add the host resource record of the mail server mail.abc.com in the DNS server

Correct answer: B
Reference analysis:
[Analysis]
①Whether to allow customers to register new mailboxes by themselves is set by the administrator in the domain parameters of the mail server. If users are allowed to register new mailboxes in the domain parameter settings, the Winmail mail server can allow users to register new mailboxes by themselves during operation.
② The receiving mail server adopts POP3, IMAP or HTTP protocol, and the sending mail server adopts SMTP protocol.
③ To establish mail routing, it is necessary to establish mail server host records and mail exchanger records in the mail server.
According to rule ①, option A is wrong; according to rule ②, option C is wrong; according to rule ③, option D is wrong. So choose option B.

Question 3: Among the following descriptions about the Winmail mail server, the correct one is ().

A. Winmail mail server allows users to register new mailboxes by themselves

B. Winmail users 可以使用Outlookregister new mailboxes by themselves

C. When the user registers a new mailbox by himself, he needs to enter the mailbox name, 域名password and other information

D. In order to establish mail routing, it needs to be in the DNS server建立该邮件服务器主机记录

Correct answer: A
Refer to analysis:
[Analysis]
Winmail mail server can allow users to use Outlook to create email accounts already established in the server, but it does not support users to use Outlook to register new emails by themselves, so option B is wrong. When the user registers a new mailbox by himself, he needs to enter the mailbox name, password and other information, 而域名是服务器固定的,并不能自行设置so option C is wrong. In order to establish mail routing, it needs to be in the DNS server 建立邮件服务器主机记录和邮件交换器记录, so option D is wrong. Winmail mail server allows users to register new mailboxes by themselves. Therefore option A is correct.

Question 4: When creating a new user in the Winmail Quick Setup Wizard, the information that does not need to be entered is ( ).

A. Username

B. Domain name

C. User password

D. User IP address

Correct answer: D
Reference analysis:
[Analysis]
When creating a user in the mail server Winmail Quick Setup Wizard, the information that needs to be entered is: mailbox name (that is, domain name and user name)] password. Therefore, there is no need to enter the IP address, so choose D for this question.

Question 5: When Winmail users use Outlook to receive emails, the protocol that cannot be used is ( ).

A、TCP

B、 DNS

C、POP3

D、SMTP

Correct answer: D
Refer to Analysis:
[Analysis]
SMTP服务器是用来发送邮件的服务器, so it is impossible to use it when receiving emails. Services related to IP allocation and routing will use the DNS protocol and the TCP protocol.

Question 10: When Winmail users use Outlook to send emails, the protocol is ( ).

A、HTTP

B、IMAP

C、 POP3

D、SMTP

Correct answer: D
Reference analysis:
[Analysis]
SMTP (Simple Mail Transfer Protocol) protocol is usually used when sending mail, and POP3 (the third version of Post Office Protocol) or IMAP (Interactive Mail Access Protocol) protocol is usually used when receiving mail. HTTP stands for Hypertext Transfer Protocol, a protocol that details the communication between browsers and World Wide Web servers. So choose option D.

Question 11: When Winmail users use a browser to view emails, which of the following protocols will be used ( )

A、HTTP

B、IMAP

C、POP3

D、SMTP

Correct answer: A
Reference analysis:
[Analysis]
SMTP (Simple Mail Transfer Protocol) protocol is usually used when sending mail, and POP3 (the third version of Post Office Protocol) or IMAP (Interactive Mail Access Protocol) protocol is usually used when receiving mail. HTTP stands for Hypertext Transfer Protocol, a protocol that details the communication between browsers and World Wide Web servers. Winmail users will use the HTTP protocol to view emails with a browser. Because the browser uses the HTTP protocol for data communication. It can be seen from the above that IMAP, POP3, and SMTP are protocols for mail delivery or reception, so choose option A.

Question 6: In the following description of the Winmail mail server, 错误的是().

A. Winmail mail server supports web-based access and management

B. Winmail mail management tools include system settings, domain name settings, etc.

C. 系统设置中You can build a virtual mail server by adding a new domain

D. In order to establish mail routing, it is necessary to establish mail server host records and mail exchanger records in the DNS server

Correct answer:
Refer to Analysis:
[Analysis]
Winmail mail management tools include [System Settings], [Domain Settings], [Users and Groups], [System Status] and [System Logs]] and other option groups. In the [System Configuration] interface, you can configure parameters such as mail filtering, mail gateway, SSL/TTS certificate, anti-virus settings, short message notification, SMTP settings, password change, and system backup. [Domain Settings] option group includes [Domain Management] and [Domain Alias ​​Management]. 在【域名管理】界面中】可进行增加新域(用于构建虚拟邮件服务器)、删除已有的域、修改域参数等操作. It can be seen that in option C, "you can build a virtual mail server by adding a new domain in the system settings" is wrong.

Question 9: Which of the following descriptions about the Winmail mail server is correct ()

A. Winmail mail server supports management through outlook client

B. The Winmail mail server does not allow users to register new mailboxes by themselves

C. Winmail mail server supports users' web-based access

D. To establish mail routing, 需在DNS服务器中establish the host record of the mail server

Correct answer: C
Reference analysis:
[Analysis] Winmail supports web-based access and management. Users can log in to the mail server or register new users through a browser. In order to establish mail routing, it is necessary to establish mail server in DNS server 主机记录和邮件交互器记录. So choose option C.

Question 13: In the following description about the Winmail mail server, the wrong one is ().

A. The server can be accessed and managed through a browser

B. New users can be registered on the server through the browser

C, through 浏览器configurable邮件交换器记录

D. Send or receive mail through the browser

Correct answer: C
reference resolution:
[Resolution]
邮件交换器记录的配置只能在服务器上配置, cannot be configured through the browser. So choose option C.

Question 14: The option to set whether the Winmail mail server allows self-registration of new users is ( ).

A. Domain name setting
B. System setting
C. SMTP setting
D. User and group setting

Correct answer: A
Reference analysis:
[Analysis]
The option to set whether the Winmail mail server allows new users to register by itself is the domain name setting

Question 15: In the Quick Setup Wizard of the Winmail mail server, what cannot be set is ( ).

A. Username

B. Domain name

C. User password

D. Admin password

Correct answer: D
Reference analysis:
[Analysis]
In the Quick Setup Wizard of the Winmail mail server, enter the information of the new user, including the user name, domain name and user password. So choose option D.

Question 16: In the following description about the Winmail mail server, the wrong one is ( ).

A. In the domain name settings, you can build a virtual mail server by adding a new domain

B. Winmail mail server supports web-based management

C. Use client software such as Outlook to access和管理Winmail邮件服务器

D. In order to establish mail routing, it is necessary to establish the host record and mail exchanger record of the mail server in the DNS server

Correct answer: C
Reference analysis:
[Analysis]
Use client software such as Outlook 只能访问Winmail邮件服务器不能管理Winmail邮件服务器. So choose option C.

Question 17: If the user's mailbox registered on the Winmail mail server is [email protected], the following description 错误的是().

A. user is the mailbox name of the user

B. mail.abc.com is the domain name of the mail server

C. The domain name of the mail server must be a standardized domain name

D. It is 邮件服务器发送邮件necessary to analyze the邮件服务器主机记录

Correct answer: D
Reference analysis:
[Analysis]
If you need to access the mail server through the domain name, you should also add the name mail.abc.com to the DNS server 主机地址(A)资源记录. So choose option D.

Question 18: Among the following options, 不属于the Winmail mail server system setting function is ( ).

A. Email filtering

B. Change the administrator password

C. SMTP settings

D. Domain name settings

Correct answer: D
Reference analysis:
[Analysis]
Winmail system settings include SMTP, mail filtering, changing administrator password, etc. 域名设置属于Winmail属于邮件管理工具的项目. So choose option D.

Question 19: ( ) is not included in the setting options provided by the Winmail mail server management tool.

A. Email management

B. User and group management

C. System settings

D. Domain name settings

Correct answer: A
Reference analysis:
[Analysis]
Winmail mail server management tools include: system settings, domain name settings, user and group settings, system status and system logs and other items.

Question 20: Among the following options, 不能用于it is ( ) to test whether the Winmail mail server works normally.

A. Use Outlook client software

B. Using a browser

C. Use tracert

D. Use telnet

Correct answer: C
Reference analysis:
[Analysis]
tracert (trace route) is a route tracking utility program, which detects the path to the destination computer by sending ICMP messages containing different TTLs and listening to the response messages. So choose option C.

Question 22: Among the following options, 可用于it is () to test whether the Winmail mail server is working normally.

A. Use Outlook

B. Use ipconfig

C. Use tracert

D. Use nslookup

Correct answer: A
Reference analysis:
[Analysis] After the mail server is installed and set up, in addition to using a web browser to log in to the mail server for testing, you can also use the mail client software for testing. B, C, and D are command statements. So choose option A.

Question 21: In the following description about the configuration, use and management of the Winmail mail server, the error is ( ).

A. Winmail mail server supports web-based access and management

B. In order to establish mail routing, it is necessary to establish the mail server host record and mail exchanger record in the DNS server

C. When using a browser to send mail,客户机与邮件服务器间使用SMTP协议

D. The Winmail mail server can realize the function of allowing users to register new mailboxes by themselves

Correct answer: C
Reference analysis:
[Analysis]
SMTP is a protocol that provides reliable and effective email transmission. SMTP is a mail service built on the FTP file transfer service, 主要用于系统之间的邮件信息传递and provides notifications about incoming letters. The sender's mail server uses the SMTP protocol to send mail to the receiver's mail server. So choose option C.

Question 23: Which of the following descriptions about Winmail mail server is correct ( ).

A. The Winmail mail server can allow users foxmailto register new mailboxes by themselves

B. Manage the mail server through the browser, optional items include system settings, port settings, system mailbox password settings, etc.

C. When sending emails with a browser, the browser uses the SMTP protocol

D. Winmail mail server supports web-based access and management

Correct answer: D
Reference analysis:
Since the Winmail mail server supports web-based access and management, IIS must be installed before installing the mail server software. Winmail mail server can allow users 浏览器to register new mailboxes by themselves. By managing the mail server through a browser, administrators can configure and manage information such as domains, users, and groups of the mail server. Web-based e-mail, the user agent is an ordinary browser, and the communication between the user and its remote mailbox is carried out through HTTP. When the sender wants to send an e-mail, it also uses HTTP instead of SMTP. So choose option D.

spanning tree protocol

Appropriate question style: Among the following descriptions of the Spanning Tree Protocol STP, the correct one is

1. The earliest STP standard formulated by IEEE is EEE802.ID. IEEE 802.1d is the currently popular STP (Spanning Tree Protocol) standard. The transparent bridge standard STP is defined in the IEEE 802.1d standard.

2. Transmit the bridge protocol data unit BPDU between the switches. There are two types of data packets: one is the configuration 配置信息BPDU (not exceeding/less than 35 bytes), and the other is 拓扑变化the topology change notification BPDU containing information (not exceeding/less than 4 个字节).

3. STP transfers BPDU data packets between switches and 默认每 2秒sends them regularly. New BPDUs are also sent when the network fails or the topology changes.

4. The blocked port is still an active port, but it can only receive BPDUs.

5. The Spanning Tree Protocol is one 二层链路管理协议.

6. STP runs on switches and bridge devices (not on routers), and it establishes a stable tree-like network through calculation.

7. The Bridge ID is represented by 8 bytes, consisting of 2 bytes of priority value and 6 bytes of switch MAC address. The priority value 增值量is 4096. The priority 取值范围is 0-61440, and the general default value is 32768.

8. The one with the smallest Bridge ID value becomes the root bridge or root switch.

Relevant real questions over the years

Question 1: What is the spanning tree protocol standard formulated by IEEE ( ).
A. IEEE802.1B

B、IEEE802.1D

C、IEEE802.1Q

D、IEEE802.1X

Correct answer: B
Reference analysis:
IEEE.802.1D is the currently popular STP (Spanning Tree Protocol) standard.

Question 2: The length of the STP topology change notification BPDU does not exceed ().

A. 4 bytes

B. 8 bytes

C. 16 bytes

D. 35 bytes

Correct answer: A
Reference analysis:
When the spanning tree protocol STP is working, the bridge protocol data unit BPDU is transmitted between switches. There are two types of data packets, one is contained 配置信息的配置BPDU (不超过35个字节), and the other is contained 拓扑变化信息的拓扑变化通知BPDU (不超过4个字节) .

Question 3: The transparent bridge standard STP is defined in ( ) standard.

A、 IEEE 802.1q

B、IEEE 802.1d

C、 IEEE 802.3u

D、IEEE 802.3z

Correct answer: B
Reference analysis:
The protocol specified according to the spanning tree algorithm is called Spanning Tree Protocol (Spanning Tree Protocol, STP). The IEEE 802.1d standard stipulates the STP protocol. It can logically block the redundant links in the network to eliminate loops in the path. When the active path fails, the redundant link can be reactivated to restore the network connection and ensure the normal operation of the network.

Question 5: In the following description of the Spanning Tree Protocol STP, the wrong one is ( ).

A. Spanning tree protocol is a layer 2 link management protocol

B. The earliest STP standard formulated by IEEE is IEEE 802.1D

C. The Bridge ID is composed of the priority value and the MAC address of the switch, and the increment value of the priority is 2048

D. The configuration BPDU does not exceed 35 bytes, and the topology change notification BPDU does not exceed 4 bytes.

Correct answer: C
Reference resolution:
Bridge ID consists of 2-byte priority value and 6-byte switch MAC address. The priority range is 0-61440, and the incremental value is 4096, so option C is wrong, so choose option C.

Question 6: In the following description of the Spanning Tree Protocol STP, the error is ().

A. STP is a Layer 2 link management protocol

B. The earliest STP standard formulated by IEEE is IEEE802.1D

C. STP transmits BPDU data packets between switches, and 5秒sends them every time by default

D. STP runs on switches and bridge devices, and it establishes a stable tree structure network through calculations.

Answer: C
Reference analysis: STP transmits BPDU data packets between switches, and 2秒sends them every time by default. So choose option C.

Question 7: In the following description of Spanning Tree Protocol (STP), 错误的是( ).

A. BridgeID is represented by 8 bytes

B. STP runs on switches 路由器设备and

C. The earliest STP standard formulated by IEEE is IEEE 802.1D

D. The blocked port is still an active port, but it can only receive BPDUs

Correct answer: B
Reference analysis: STP runs on switches and 网桥设备above, not on routers.

Question 8: In the following description about Spanning Tree Protocol (STP), 错误的是( ).

A. BPDU is sent every 2 seconds

B. The default value of general switch priority is 32768

C. The value range of the priority 1-61440is 4096 increments

D. The configuration BPDU does not exceed 35 bytes, and the topology change notification BPDU does not exceed 4 bytes.

Correct answer: C
reference analysis: The value range of the priority is 0-61440, and the increment is 4096.

Question 10: In the following description of the Spanning Tree Protocol STP, 错误的是( )

A. The earliest STP standard is IEEE802.1D

B. Spanning tree protocol is a layer 2 link management protocol

C. Configure BPDU data packets not to exceed 4个字节, topology change notification BPDU不超过35个字节

D. The Bridge ID is composed of the priority value and the MAC address of the switch. The increment of the priority value is 4096

Correct answer: C
reference analysis: 配置BPDU数据包no more than 35 bytes, 拓扑变化notification BPDU no more than 4 bytes. So choose option C.

Question 11: In the following description of the Spanning Tree Protocol STP, the wrong one is ( ).

A. BPDU is sent regularly every 2 seconds

B. The one with the smallest Bridge ID value becomes the root bridge or root switch

C. There are two types of BPDU, configuration BPDU (<35 bytes), topology change notification BPDU (<4 bytes)

D. Bridge ID is composed of 2-byte priority value and switch MAC address, and the value increment of priority is2048

Correct answer: D
Reference analysis: Bridge ID is composed of 2-byte priority value and value 6个字节的交换机MAC地址, and the increment value of priority is 4096. So choose option D.

Question 16: In the following description of the Spanning Tree Protocol STP, 错误的是( ).

A. Bridge ID is composed of 2-byte priority value and 6-byte switch MAC address, and the value increment of priority is 4096

B. The one with the smallest Bridge ID value becomes the root bridge and root switch

C. There are two types of BPDU, which are configuration BPDU (<=35 bytes) and topology change notification BPDU (<=4 bytes)

D. BPDU 每5秒钟is sent once regularly

Correct answer: D
Reference analysis:
BPDU is sent regularly every 2 seconds, and a new BPDU will also be sent when the network fails or the topology changes, so as to maintain the spanning tree structure. So choose option D.

Question 18: In the following description of the Spanning Tree Protocol STP, 错误的是( ).

A. The Bridge ID value 最大的becomes the root bridge and root switch

B. BPDU is sent regularly every 2 seconds - once

C. There are two types of BPDUs, namely configuration BPDU (<35 bytes) and topology change notification BPDU (<4 bytes)

D. The Bridge ID consists of a 2-byte priority value and the MAC address of the switch, and the value increment of the priority is 4096

Correct answer: A
Reference analysis:
The Bridge ID value 最小的becomes the root bridge and root switch. So choose option A.

IEEE

Appropriate question style: Among the following descriptions about the IEEE XXX protocol, which one is correct

1. The three definitions of IEEE 802.11 物理层include two spread spectrum technologies (FHSS, DSSS) and one infrared propagation specification.

2. 802.11 无线传输频道is defined in the 2.4GHz ISM frequency band, which defines 传输速率1Mbps and 2Mbps.

3. IEEE802.11 introduces an RTS/CTS option in the MAC sublayer.

4. 802.11 defines two types of devices: wireless nodes and wireless access points.

5. 无线接入点APIts role is to provide a bridge between wireless and wired networks, not a wireless node.

6. IEEE 802.11 运作模式is divided into point-to-point mode and basic mode.

7. 点对点模式It refers to the communication mode between the wireless network card and the wireless network card. It can allow at most 256台 PC 连接.

8. 基本模式It refers to the communication method when the scale of the wireless network is expanded or when the wireless and wired networks coexist. The access point is responsible for command work such as frequency band management and roaming, and one access point can be connected at most 1024 台 PC.

9. The maximum capacity of 802.11b is 33 Mbps, which increases the transmission rate to 11 Mbps, and 802.11a and 802.11g increase the transmission rate to 54 Mbps.

10. The IEEE 802.11b`** standard uses the open 2.4GHZ frequency band, which can be used directly without applying for S.

11. IEEE 802.1d is currently the most popular STP (Spanning Tree Protocol) standard.

12. The focus of the 802.11 standard is to solve the problem of mobile node communication within the LAN range. The focus of the 802.16 standard is to solve the problem of data communication between buildings. 802.16a adds support for non-line-of-sight and wireless mesh network structures for fixed node access.

13. IEEE802.11Operating in the 2.4GHz ISM frequency band, the maximum transmission rate is 1-2Mbps:

14. IEEE802. 11bOperating in the 2.4GHz ISM frequency band, the maximum transmission rate is 11Mbps, and the maximum capacity is 33Mbps;

15. IEEE802.1laRunning in the 5GHz UNII frequency band, the maximum transmission rate is 54Mbps, and the maximum capacity is 432Mbps:

16. IEEE802.11gOperating in the 2.4GHz ISM frequency band, the maximum transmission rate is 54Mbps, the actual throughput is 28~31Mbps, and the maximum capacity is 162Mbps.

Basic Situation and Comparison of Main Standards of IEEE 802.16 Series

protocol standard use frequency band channel condition fixed/mobile Channel bandwidth/MHz Transmission speed/Mbit/s Rated cell radius/km
IEEE 802. 16 10~66GHz line of sight fixed 25/28 32 ~ 134 <5
IEEE 802.16a <11GHz NLOS fixed 1.25/20 75 5~10
IEEE 802.16d-2004 10 ~66GHz <11GHz Line of sight + non-line of sight fixed 1.25/20 75 5~15
IEEE 802.16e-2005 <6GHz NLOS Fixed Mobile + Roaming 1.25/20 30 Slightly

Comparison of the characteristics of IEEE 802. 11a, IEEE 802. 11b, IEEE 802. 11g

Protocol type Wi-Fi Alliance Certification actual throughput Maximum data transfer rate Maximum capacity indoor distance Backward compatibility path/km with IEEE 802.11b Interference with other devices
IEEE802.11b yes 5~7Mbit/s 11Mbit/s 33Mbit/s (3 channels x11) 100m is operating on the 2.4GHz ISM band are such as cordless phones, microwave ovens, bluetooth
IEEE802.11a yes 28~31Mbit/s 54Mbit/s 432Mbit/s(8 channels×54) Compared with IEEE 802.11b and IEEE802.11g, the speed is faster within 30m No movement on the 5GHz frequency band no
IEEE802.11g no 28~31Mbit/s (pure IEEE 802.11g environment) 10 - 12Mbit/s (mixed with IEEE 802.11b client) 54Mbit/'s 162Mbit/s (3 channels x54) Faster speed within 30m compared to IEEE 802.11b Is operating on the 2.4GHz ISM band (note: total throughput will be reduced in mixed IEEE 802 11b and IEEE 802 11g networks) are such as cordless phones, bluetooth, microwave ovens

Relevant real questions over the years

Question 1: In the following description about the IEEE802.11 standard, 错误的是( ).

A、 IEEE802.11无线传输的频道定义在UNII波段

B. IEEE802.11 defines two spread spectrum technologies and one infrared propagation specification at the physical layer

C. IEEE802.11 introduces an RTS/CTS option in the MAC sublayer

D. The transmission rate defined by IEEE802.11 is 1Mbps and 2Mbps

Correct answer: A
Reference analysis:
The three physical layers originally defined by IEEE 802.11 include two spread spectrum technologies and an infrared propagation specification, and the wireless transmission channel is defined in the 2.4GHz ISM band. The transmission rate defined by IEEE 802.11 wireless standard is 1Mbps and 2Mbps, and FHSS (Frequency Hopping Spread Spectrum) and DSSS (Self-Sequence Spread Spectrum) technologies can be used. In order to solve the "hidden node" problem, IEEE 802.11 introduces a new RTS/CTS option on the MAC layer. In summary, option A is wrong.

Question 2: The following describes the basic operation mode of IEEE802.11b, 错误的是( ).

A. Point-to-point mode refers to the communication mode between the wireless network card and the wireless network card

B. Up to 256 PCs can be connected in point-to-point mode

C. The basic mode is a communication mode in which wireless and wired networks coexist

D. An access point in basic mode最多可连接512台PC

Correct answer: D
Reference analysis:
The operation mode of IEEE 802.11b is divided into point-to-point mode and basic mode. The peer-to-peer mode refers to the communication mode between the wireless network card and the wireless network card. This connection method is very convenient for small networks 它最多可以允许256台PC连接. The basic mode refers to the communication mode when the scale of the wireless network is expanded or the wireless and wired networks coexist. This is also the most popular mode of IEEE 802.11b now. The access point is responsible for command work such as frequency band management and roaming. One access point can connect up to 1024 PCs. To sum up, option D is wrong.

Question 3: The spanning tree protocol standard formulated by IEEE is ( ).

A、IEEE802.1B

B、IEEE802.1D

C、IEEE802.1Q

D、IEEE802.1X

Correct answer: B
Reference analysis: IEEE.802.1D is the currently popular STP (Spanning Tree Protocol) standard.

Question 4: In the following description about the IEEE802.11 standard, 错误的是( )

A. Defines 无线结点and 无线接入点two types of equipment

B. The role of the wireless node is to provide a bridge between wireless and wired networks

C. The physical layer initially defines three specifications of FHSS, DSSS spread spectrum technology and infrared propagation

D. The CSMA/CA protocol of the MAC layer uses the ACK signal to avoid collisions

Correct answer: B
Reference analysis: 无线接入点AP的作用是提供无线和有线网络之间的桥接, not wireless nodes.

Question 6: Which of the following descriptions of the IEEE802.11 protocol is wrong ( )

A. Defines two types of devices: wireless nodes and wireless access points

B. The physical layer adopts FSK modulation mode

C. MAC layer adopts CSMA/CA protocol

D. The point-point working mode can support a wireless Ad hoc network composed of up to 256 nodes

Correct answer: B
Reference analysis:
The transmission rate defined by the IEEE802.11 wireless standard is 1Mbps and 2Mbps, and FHSS and DSSS technologies can be used. 802.11 defines two types of devices: wireless nodes and wireless access points. Some adjustments have been made to CSMA/CD in 802.11, and the new protocol CSMA/CA or DCF.802.116 is basically divided into two operating modes: point-to-point mode and basic mode. Among them, the point-to-point mode can connect up to 256 PCs. So A, C, and D are all correct, so B1 is wrong.

Question 7: In the following description of the IEEE802.16 protocol, 错误的是( ).

A. 802.16 is mainly used to solve the problem of broadband wireless access in urban areas

B. 802.16afor移动结点接入

C. 802.16d is used for fixed node access

D. 802.16e is used for fixed or mobile node access

Correct answer: B
Reference analysis:
The focus of the 802.11 standard is to solve the problem of mobile node communication within the LAN range, and the focus of the 802.16 standard is to solve the problem of data communication between buildings, 802.16aadding support for non-line-of-sight and wireless mesh network structures 固定结点接入.

Question 8: Which of the following descriptions about the IEEE802.11b protocol is wrong ( )

A. Using CSMA/CA medium access control method

B. Allow peer-to-peer communication between wireless nodes

C. The indoor environment communication distance is up to 100 meters

D. The maximum transmission rate can reach 54Mbps

Correct answer: D
Reference analysis:
The bandwidth of IEEE802.11b wireless LAN can reach up to 11Mbps, and 802.11athe maximum bandwidth is 54mbps, so choose D option for this question.

Question 10: In the following descriptions of the three protocols of IEEE 802.11, 错误的是( )

A. The actual throughput of IEEE 802.11a is 28~31Mbps

B. The maximum capacity of IEEE 802.11a is 432Mbps

C, IEEE 802.11bthe maximum capacity is88Mbps

D. The maximum capacity of IEEE 802.11g is 162Mbps

Correct answer: C
Reference analysis:
Comparison of the three protocols of IEEE802.11
insert image description here
It can be seen from the table IEEE 802.11b的最大容量是33Mbps. So choose option C. .

Question 11: The WLAN standard 802.11a increases the transmission rate to ( ).

A、5.5Mbps

B、11Mbps

C、54Mbps

D、100Mbps

Correct answer: C

Reference analysis:
The transmission rates of the three protocols in IEEE802.11 are: the maximum data transmission rate of 802.11b is 11Mbps, the maximum data transmission rate of 802.11a is 54Mbps, and the maximum data transmission rate of 802.11g is 54Mbps. Therefore option C is correct.

Question 12: In the following description about the basic operation mode of IEEE802.11b, the wrong one is ( ).

A. Point-to-point mode refers to the communication mode between the wireless network card and the wireless network card

B. Point-to-point connection mode As long as the PC is plugged in with a wireless network card, it can be connected to another PC with a wireless network card.最多可连接512台PC

C. The basic mode refers to the communication method when the wireless network scale is expanded or the wireless and wired networks coexist

D. When using the basic mode, the PC with the wireless network card needs to be connected to another PC through the access point, and an access point can connect up to 1024 PCs

Correct answer: B
Reference analysis:
IEEE802.11b is the second-generation wireless LAN protocol standard launched on the basis of the wireless standard IEEE802.11. 802.11 WLAN operation mode can be divided into two types: point-to-point (Ad Hoc) mode and basic (Infrastructure) mode.
Point-to-point mode refers to the direct communication between wireless network card and wireless network card. As long as the PC is plugged with a wireless network card, it can be connected to another PC with a wireless network card, which is a convenient connection method 最多可连接256个移动结点.
The basic mode refers to the communication mode in which the scale of the wireless network is expanded or the wireless and wired networks coexist, which is also the most commonly used mode of 802.11. At this time, the mobile node with the wireless network card plugged in needs to connect with another mobile node through the access point AP (Access Point). The access point is responsible for frequency band management and roaming management, and one access point can connect up to 1024 mobile nodes. So option B is wrong.

Question 13: Using the IEEE802.11b standard to interconnect the LANs in two buildings into a logical network, the wireless device to be used is ( )

A. Wireless bridge

B. Wireless router

C. Wireless access point

D. Wireless network card

Correct answer: A
Reference analysis:
Wireless access points are also wireless APs, which are used to gather wireless or wired terminals, and their functions are similar to hubs and switches. A wireless router is an AP with a routing function, which is used to establish a smaller wireless local area network. The wireless bridge is mainly used to connect several different network segments to realize long-distance wireless data communication. The wireless network card is used for point-to-point communication between two computers with wireless network cards to form a minimum wireless local area network, so choose A for this question.

Question 31: IEEE802.11b 点对点模式is a convenient connection method, and the wireless device required for this mode is ( ).

A. Wireless network card

B. Wireless bridge

C. Wireless access point

D. Wireless router

Correct answer: A
Reference analysis:
802.11b defines two types of devices: wireless nodes and wireless access points.
The point-to-point mode refers to the communication method between the wireless network card and the wireless network card, and the basic mode refers to the communication method when the wireless network scale is expanded or the wireless and wired networks coexist. According to the analysis, choose option A.

Question 15: Among the following descriptions about IEEE802.11 series standards, the error is ( ).

A. IEEE802.11 operates in the 2.4GHz ISM frequency band, and the maximum transmission rate is 1~2Mbps

B. IEEE802.11b operates in the 2.4GHz ISM frequency band, the maximum transmission rate is 11Mbps, and the maximum capacity is 33Mbps

C. IEEE802.11a operates in the 5GHz UNII frequency band, the maximum transmission rate is 54Mbps, and the maximum capacity is162Mbps

D. IEEE802.11g runs in the 2.4GHz ISM frequency band, and the actual throughput is 28-31Mbps

Correct answer: C
Refer to analysis:
IEEE802.11 operates in the 2.4GHz ISM frequency band, the maximum transmission rate is 1~2Mbps;
IEEE802.11b operates in the 2.4GHz ISM frequency band, the maximum transmission rate is 11Mbps, the maximum capacity is 33Mbps; IEEE802.11a operates in the 5GHz
UNI frequency band, the maximum transmission rate is 54Mbps, 最大容量是432Mbps; IEEE802.11g operates in the 2.4GHz ISM frequency band, the maximum transmission rate is 54Mbps, the actual throughput is 28-31Mbps, and the maximum capacity is 162Mbps. Therefore, option C describes the error.

Question 16: In the following description about the IEEE802.16 standard, 错误的是( ).

A. Provide routing services required by broadband MAN users to access the Internet

B. The maximum transmission rate is234Mbps

C. The wireless frequency band is 10-66GHz

D. The forum organization corresponding to the IEEE802.16 standard working group is WiMAX

Correct answer: B
Reference analysis:
IEEE802.16 defines the broadband wireless metropolitan area network access standard, and its transmission rate is 32 134Mbps,.
IEEE802.16 is a point-to-multipoint standard under line-of-sight conditions, 最高传输速率为134Mbpsand is used for large data volume access.

Question 17: A Cisco switch is connected to a 3COM switch, and the connected ports are both working in VLAN trunk mode. The VLAN protocol that these two ports should use is ( ).

A. ISL and IEEE802.10

B. ISL and ISL

C, ISL and IEEE802.1Q

D. IEEE802.1Q and IEEE802.1Q

Correct answer: D
Reference analysis: To implement the Trunk function between switching devices, the same VLAN protocol must be followed. The international standard IEEE 802.1Q protocol can interconnect switching devices of different manufacturers, and is the only standard protocol for realizing VLAN Trunk. Therefore, when interconnecting switches from different manufacturers to implement the VLAN Trunk function, the IEEE802.1Q protocol must be encapsulated on the two directly connected switch ports to ensure the consistency of the protocol, otherwise the information of multiple VLANs cannot be transmitted correctly.

Question 18: Use IEEE802.11b standard peer-to-peer solution to connect 4 computers into a wireless local area network. If the wireless local area network is required to be connected to a wired LAN and the peer-to-peer solution remains unchanged, the solution is ().

A. Increase AP

B. No solution

C. Install a wireless network card in one of the computers

D. Install an Ethernet network card on one of the computers

Correct answer: D
Reference analysis:
The peer-to-peer solution of the IEEE 802.11b standard is the simplest point-to-point application solution, as long as a wireless network card is installed for each computer, they can access each other, but multi-point access cannot be performed at the same time. If you need to communicate with a wired LAN, you can install an Ethernet network card for one of the computers, and other computers in the wireless network can use this computer as a gateway to access wired networks or share printers and other devices.

Question 19: The transparent bridge standard STP is defined in the ( ) standard.

A、IEEE 802.1q

B、IEEE 802.1d

C、 IEEE 802.3u

D、IEEE 802.3z

Correct answer: B
Reference analysis:
The protocol specified according to the spanning tree algorithm is called Spanning Tree Protocol (Spanning Tree Protocol, STP). The IEEE 802.1d standard specifies the STP protocol, which can logically block redundant links in the network to eliminate loops in the path, and can reactivate the redundant link to restore network connectivity when the active path fails, ensuring the normal operation of the network.

Question 20: In the following description of IEEE 802.11b wireless local area network, the error is ( ).

A. Using the peer-to-peer solution of IEEE 802.11b standard, just install a wireless network card for each computer

B. In the working mode of multi-cell roaming, the whole roaming process is transparent to the user

C. Using direct sequence wireless spread spectrum technology, the 2.4GHZ frequency band can be used after application

D. When the IEEE 802.11b network card is in sleep mode, the access point buffers the information to the client

Correct answer: C
Reference analysis:
The IEEE 802.11b standard uses the open 2.4GHz frequency band, which can be used directly without application. So option C is wrong.

Question 26: In the following description of IEEE802.11 series standards, the error is ().

A. IEEE802.11a works in the 5GHz UNII frequency band

B. The maximum transmission rate of IEEE802.11g is 54Mbps

C. The actual throughput of IEEE802.11b is28-31Mbps

D. The maximum capacity of IEEE802.11a is 432Mbps The correct answer:

Correct answer: C
reference resolution:

wireless standard 802.11a 802.11b 802.11g
Working frequency 5GHz 2.4GHz 2.4GHz
Maximum transfer rate 54Mbit/s 11Mbit/s 54Mbit/s
throughput 28-31Mbit/s 5-7Mbit/s 28-31Mbit/s

So choose option C.

Question 28: In the following description of the operation mode of IEEE802.11b, 错误的是( ).

A. Point-to-point mode can connect up to 256 PCs

B. The access point is responsible for frequency band and roaming management. One access point can connect up to 1024 PCs

C. The basic mode refers to the communication method when the wireless network scale is expanded or the wireless and wired networks coexist

D. 点对点模式When using, the PC with the wireless network card needs to be connected to another PC by the access point

Correct answer: D
Reference analysis:
802.11b operation mode is basically divided into two types: point-to-point mode and basic mode.
1. 点对点模式是指无线网卡和无线网卡之间的通信方式,只要PC插上无线网卡即可与另一具有无线网卡的PC连接, up to 256 PCs can be connected.
2. 基本模式It refers to the communication method when the scale of the wireless network is expanded or when the wireless and wired networks coexist 插上无线网卡的PC需要由接入点与另一台PC连接. The access point is responsible for frequency band management and roaming and other command work. One access point can connect up to 1024 PCs (wireless network cards). So choose option D.

Question 29: In the following description about IEEE802.11 series standards, 错误的是( ).

A. The MAC layer of IEEE802.11 adopts CSMA/CA protocol

B. The maximum transmission rate of IEEE802.11a is5.4Mbps

C. The maximum transmission rate of IEEE802.11b is 11Mbps

D. The maximum transmission rate of IEEE802.11g is 54Mbps

Correct answer: B
Reference analysis: The maximum transmission rate of IEEE802.11a is 54Mbit/s. So choose option B.

Question 32: The actual throughput is 28-31Mbps, and the IEEE802.11 standard with a maximum capacity of 432Mbps is ( ).

A、IEEE802.11

B、 IEEE802.11a

C、 IEEE802.11b

D、 IEEE802.11g

Correct answer: B
Reference analysis:
IEEE802.11 originally defined transmission standards as 1Mbps and 2Mbps.
IEEE802.11a has a maximum data transmission rate of 54Mbps, an actual throughput of 28-31Mbps, and a maximum capacity of 432Mbps. The maximum data transmission rate of IEEE802.11b is 11Mbps, the actual throughput is 5-7Mbps, and the maximum capacity is 33Mbps. The maximum data transmission rate of IEEE802.11g is 54Mbps, and the actual throughput is 28-31Mbps (all in the 802.11g environment) 10-12Mbps (mixed environment with 802.11b clients), the maximum capacity is 162Mbps.
So choose option B.

Question 34: The following IEEE802.11 standard operating in the ISM frequency band, the actual throughput is 28-31Mbps, and the maximum capacity is 162Mbps is ( )

A、IEEE802.11

B、IEEE802.11a

C、 IEEE802.11b

D、IEEE802.11g

Correct answer: D
Reference analysis:
IEEE802.11 originally defined transmission standards as 1Mbps and 2Mbps.
IEEE802.11a has a maximum data transmission rate of 54Mbps, an actual throughput of 28-31Mbps, and a maximum capacity of 432Mbps.
The maximum data transmission rate of IEEE802.11b is 11Mbps, the actual throughput is 5-7Mbps, and the maximum capacity is 33Mbps. The maximum data transmission rate of IEEE802.11g is 54Mbps, the actual throughput is 28-31Mbps (all in 802.11g environment) 10-12Mbps (mixed environment with 802.11b client), the maximum capacity is 162Mbps. So choose option D.

Question 36: Which of the following IEEE802.11 standards has an actual throughput of 5-7Mbps and a maximum capacity of 33Mbps ( ).

A、IEEE802.11

B、IEEE802.11a

C、IEEE802.11b

D、IEEE802.11g

Correct answer: C
Reference Analysis:
The transmission standards originally defined by IEEE802.11 are 1Mbps and 2Mbps.
The maximum data transmission rate of IEEE802.11a is 54Mbps, the actual throughput is 28-31Mbps, and the maximum capacity is 432Mbps. IEEE802.11b maximum data transmission rate is 11Mbps, actual throughput is 5-7Mbps, maximum capacity is 33Mbps
IEEE802.11g maximum data transmission rate is 54Mbps, actual throughput is 28-31Mbps (all in 802.11g environment) 10-12Mbps (mixed environment with 802.11b client), maximum capacity is 162Mbps.
So choose option C.

Question 40: Which of the following IEEE802.11 standards has an actual throughput of 28-31Mbps and a maximum capacity of 162Mbps is ( ).

A、IEEE 802.11

B、 IEEE 802.11a

C、IEEE 802.11b

D、IEEE 802.11g

Correct answer: D
Reference analysis:
The transmission standards originally defined by IEEE 802.11 are 1Mbps and 2Mbps.
The maximum data transmission rate of IEEE802.11a is 54Mbps, the actual throughput is 28-31Mbps, and the maximum capacity is 432Mbps. The maximum data transmission rate of IEEE802.11b is 11Mbps, the actual throughput is 5-7Mbps, and the maximum capacity is 33Mbps. The maximum data transmission rate of IEEE802.11g is 54Mbps, and the actual throughput is 28-31Mbps (all in IEEE 802 .11g environment) and 10-12Mbps (mixed environment with IEEE 802.11b client), the maximum capacity is 162Mbps. So choose D option
.

Question 41: The following IEEE 802.11 standard operating in the ISM frequency band with a transmission rate of 54Mbps is ( ).
A. IEEE 802.11

B、IEEE 802.11a

C、IEEE 802.11b

D、 IEEE 802.11g

Correct answer: D
Reference analysis:
IEEE 802.11g works in the ISM frequency band, and the transmission rate is 54Mbps wireless LAN standard. So choose option D.

Question 43: The following transmission rate is 54Mbps, and the IEEE 802.11 standard operating on the 5GHz frequency band is ( ).

A、IEEE 802.11

B、 IEEE 802.11a

C、IEEE 802.11b

D、IEEE 802.11g

Correct answer: B
Reference analysis:
IEEE 802.11a works in the 5GHz UNI frequency band, and the maximum data transmission rate is 54Mbps. So choose option B.

Question 47: Which of the following wireless local area network standards with a transmission rate of 54Mbps and a maximum capacity of 432Mbps is ( )

A、 IEEE802.11

B.、IEEE802.11a

C、 IEEE802.11b

D、 IEEE802.11g

Correct answer: B
Reference analysis:
IEEE802.11 originally defined transmission standards as 1Mbps and 2Mbps,
IEEE802.11a maximum data transmission rate is 54Mbps, actual throughput is 28-31Mbps, maximum capacity is 432Mbps. IEEE802.11b maximum data transmission rate is 11Mbps, actual throughput is 5-7Mbps, maximum capacity is 33Mbps. IEEE802.1 The maximum data transmission rate of 1g is 54Mbps, the actual throughput is 28-31Mbps (all in 802.11g environment) 10-12Mbps (mixed environment with 802.11b client), the maximum capacity is 162Mbps
.

Question 49: In the following description of IEEE802.11 series standards, 错误的是()

A. The maximum capacity of IEEE802.11a is532Mbps

B. The actual throughput of IEEE802.11a is 28-31Mbps

C. The maximum capacity of IEEE802.11b is 33Mbps

D. The maximum capacity of IEEE802.11g is 162Mbps

Correct answer: A
Reference analysis:
The transmission standards originally defined by IEEE802.11 are 1Mbps and 2Mbps.
The maximum data transmission rate of IEEE802.11a is 54Mbps, and the actual throughput is 28-31Mbps 最大容量432Mbps. The maximum data transmission rate of IEEE802.11b is 11Mbps, the actual throughput is 5-7Mbps, and the maximum capacity is 33Mbps. The maximum data transmission rate of IEEE802.11g is 54Mbps, the actual throughput is 28-31Mbps (all in 802.11g environment) 10-12Mbps (mixed environment with 802.11b client), the maximum capacity is 162Mbps.

Question 50: In IEEE802.11b point-to-point mode, the only wireless device required is ().

A. Wireless access point

B. Wireless router

C. Wireless network card

D. Wireless bridge

Correct answer: C
Reference analysis:
Wireless access point: The basic function of this device is to gather wireless or wired terminals, and its function is similar to a hub and switch in a wired LAN. Wireless router: A wireless router is an AP (Access Point, access point) with a wireless routing function. Generally, it has a NAT function and can be used to establish a small wireless local area network. Wireless network card: the most basic hardware in wireless local area network, which mainly realizes point-to-point communication. Wireless bridge: It is mainly used to connect several different network segments to realize long-distance wireless communication.

Question 52: In the following description of IEEE802.11 series standards, 错误的是( ).

A. The actual throughput of IEEE802.11b is 5~7Mbps

B. The maximum transmission rate of IEEE802.11g is 54Mbps

C. The maximum capacity of IEEE802.11a is864Mbps

D. IEEE802.11a works in the 5GHz UNII frequency band

Correct answer: C
Reference analysis:
The maximum capacity of IEEE 802.11a is 432Mbps. So choose option C.

Question 53: Among the following descriptions of IEEE802.11 series standards, the wrong one is ( ).

A. IEEE802.11a works in the 5GHz UNII frequency band

B. The maximum transmission rate of IEEE802.11g is 54Mbps

C. The maximum capacity of IEEE802.11b is 33Mbps

D. The actual throughput of IEEE802.11b is 28~31MbpsIEEE802

Correct answer: D
Reference analysis:
The maximum data transmission rate of IEEE 802.11b is 11Mbps, the actual throughput is 5-7Mbps, and the maximum capacity is 33Mbps. So choose option D.

Question 60: In the following description about IEEE802.11 series standards, 错误的是().

A. IEEE802.11a works in the 5GHz UNII frequency band

B. The maximum transmission rate of IEEE802.11g is 54Mbps

C. The maximum capacity of IEEE802.11b is 33Mbps

D. The frequency band used by IEEE802.11b 不会interferes with each other with wireless phones, Bluetooth, microwave ovens, etc.

Correct answer: D
Reference analysis:
The frequency band used by IEEE 802.11b will interfere with wireless phones, Bluetooth, microwave ovens, etc. So choose option D.

Question 63: Among the following descriptions of IEEE802.11 series standards, the error is ( ).

A. The actual throughput of IEEE802.11b is 5~7Mbps

B. The maximum transmission rate of IEEE802.11g is 54Mbps

C. IEEE802.11a works in the 2.4GHz ISM frequency band

D. The maximum capacity of IEEE802.11a is 432Mbps

Correct answer: C
Reference analysis: IEEE802.11a works in the 5GHz UNII frequency band. So choose option C.

Question 67: In the following description of IEEE802.11 series standards, 错误的是()

A. IEEE802.11a works in the 5GHz UNII frequency band

B. The maximum transmission rate of IEEE802.11g is11Mbps

C. The actual throughput of IEEE802.11b is 5~7Mbps

D. The maximum capacity of IEEE802.11a is 432Mbps

Correct answer: B
Reference analysis:
The maximum transmission rate of IEEE802.11g is 54Mbps. So choose option B.

Question 71: In the following description of IEEE802.11 series standards, 错误的是( ).

A. Although the two technologies of FHSS and DSSS used by IEEE802.11 technology are different in operating mechanism,但不同设备可以互操作

B. IEEE802.11g runs in the 2.4GHz ISM frequency band, and its maximum transmission rate is 54 Mbps

C. IEEE802.11b runs in the 2.4GHz ISM frequency band, and its actual throughput is 5~7Mbps

D. IEEE802.11a works in the 5GHz UNI1 frequency band, and its maximum transmission rate is 54Mbps

Correct answer: A
Reference analysis:
The transmission rate defined by the IEEE 802.11 wireless standard is 1Mbps and 2Mbps, and FHSS (Frequency Hopping Spread Spectrum) and DSSS (Self-Sequence Spread Spectrum) technologies can be used. It should be pointed out that FHSS和DSSS技术在运行机制上是完全不同的,所以采用这两种技术的设备没有互操作性. So choose option A.

Question 75: In the following description of IEEE802.11 series standards, 错误的是( ).

A. IEEE802.11g works in 5GHz ISMthe frequency band

B. The maximum transmission rate of IEEE802.11g is 54Mbps

C. The actual throughput of IEEE802.11b is 5~7Mbps

D. The maximum capacity of IEEE802.11a is 432Mbps

Correct answer: A
Reference analysis:
IEEE802.11g works in the 2.4GHz ISM frequency band. So choose option A.

Description of VLAN ID

Appropriate question style: Among the following descriptions of VLAN identification, the correct one is

1. VLAN works on the second layer ( 数据链路层) of the OSI reference model, not the network layer. Communication between VLANs must pass through routers.

2. VLAN is based on switched network.

3. To create a VLAN without a given name, the system will automatically 缺省create it according to the VLAN name (VLANOOxxx), where "xxx" is the VLAN ID.

4. According to the IEEE802.1Q standard, the VLAN ID used to identify a VLAN is 12bitrepresented by (bit, bit).

5. Each VLAN is an independent logical network and a single broadcast domain.

6. Define VLAN members according to the MAC address of each device connected to the switch is a dynamic VLAN

7. The division of VLAN is not limited by the physical location and physical network segment of the user, nor by the actual switch segment.

8. VLAN ID 标准范围is 1~1005, 扩展范围1025~4096

9. Within the scope of the VLAN ID standard, the VLAN IDs that can be used for Ethernet are 2-1000

10. A VLAN is identified by a VLAN name (VLAN name) and a VLAN number (VLAN ID). The VLAN name is represented by 1~32 characters, which can be letters and numbers.

11. The VLAN whose ID is 1 is the default VLAN of the system. It is usually used for device management. Users can only use this VLAN, but cannot delete it, ie 无法执行"novlan 1”命令. 2-1000 are used for Ethernet VLANs, these VLANs can be established, used and deleted. 1002-1005 are reserved for FDDI and TokenRing VLANs, 1025-4094 are extended VLAN IDs, and others are reserved ID numbers.

Relevant real questions over the years

Question 1: In the following description about VLAN identification, 错误的是( ).

A. The extended VLAN ID range is 1025-4094

B. VLAN is usually identified by VLAN ID and VLAN name

C. The default VLAN name is automatically generated by the system according to the VLAN ID

D. According to the IEEE 802.1Q standard, the VLAN name is most used12个字符表示

Correct answer: D
Reference analysis:
VLAN is usually identified by VLAN ID and VLAN name. The extended VLAN ID range is 1025-4094. The default VLAN name is automatically generated by the system according to the VLAN ID. The IEEE 802.1Q standard stipulates that the VLAN name is at most, which can be letters and numbers 用32个字符表示. According to the analysis, it can be seen that option D is wrong, so choose D option.

Question 2: In the following description about VLAN identification, 错误的是().

A. The VLANID range of Ethernet is 1~1000

B. IEEE 802.1Q standard regulationsVLANID用16位表示

C. When VLANID is 223, the default VLAN name is VLAN00223

D. The IEEE 802.1Q standard stipulates that the VLAN name can be represented by up to 32 characters

Correct answer: B
Reference analysis: IEEE 802.1Q standard VLANID用12位表示. (The ID range of Ethernet is 1-1000 and 2-1000 are all correct, 1 is used as the management address and not used for allocation)

Question 3: In the following description about VLAN identification, 错误的是( ).

A. The IEEE802.1Q standard stipulates that VLANID is represented by 12 bits

B. The VLANID range of FDDI and TokenRing is 1002~1005

C. When VLANID is 223, the default VLAN name isVLAN000223

D. The IEEE802.1Q standard stipulates that the VLAN name can be represented by up to 32 characters

Correct answer: C
Reference analysis: When the VLANID is 223, the default VLAN name is VLAN00223, and there is an extra 0 in option C.

Question 4: In the following description about VLAN identification, the wrong one is ().

A. The VLANID range of Ethernet is1-1005

B. The IEEE802.1Q standard stipulates that VLANID is represented by 12 bits

C. When VLANID is 223, the default VLAN name is VLANO0223

D. The IEEE802.1Q standard stipulates that the VLAN name can be represented by up to 32 characters

Correct answer: A
Reference analysis: Ethernet VLAN ID range is 2-1000, FDDI and Token Ring VLAN ID range is 1002-1005.

Question 5: In the following description of VLAN identification, 错误的是( ).

A. VLAN name is 48个字符represented by letters and numbers

B. The IEEE802.1Q standard stipulates that the VLAN ID is represented by 12bit

C. The VLAN IDs available for Ethernet within the VLAN ID standard range are 2-1000

D. When creating a VLAN with an ID of 300, if no name is given, the system will use the default VLAN name VLAN00300

Correct answer: A
Reference analysis: VLAN name is represented by 32 characters, which can be letters and numbers. So choose option A.

Question 7: In the following description of VLAN identification, 错误的是( ).

A. VLAN ID is represented by 12bit

B. The extension range of VLAN ID is 1025-4096

C. VLAN name is represented by 32 characters, which can be letters and numbers

D. The VLAN IDs available for Ethernet within the scope of the VLAN ID standard are1-1005

Correct answer: D
Reference analysis: The VLAN IDs available for Ethernet are 2-1000 within the standard range of VLAN IDs, so choose option D.

Question 9: Which of the following descriptions of VLAN identification is wrong ( )

A. The VLAN name can be represented by up to 32 characters, which can be letters and numbers

B. According to the IEEE 802.1Q standard, the VLAN ID is represented by 12 bits.

C. The VLAN IDs available for Ethernet within the VLAN ID standard range are 2-1000

D. When creating a VLAN, if no name is given, the system will use the default VLAN name(VLAN000xxx)

Correct answer: D
Reference analysis: When creating a VLAN, if no name is given, the system will use the default VLAN name (VLAN00xxx) to create a VLAN. So choose option D.

DHCP server

(1) Scope 1. The scope is the complete ( )
of the possible IP addresses used in the network . Only after the scope is defined and the exclusion range is applied, can the client be assigned an address, and the remaining addresses are available within the scope .连续范围并不负责IP地址分配必须激活“地址池”

2. For the server 可为多个网段分配IP地址, multiple network segment IP addresses are required 配置多个作用域、地址池.

3. When creating a new scope in the DHCP server, the time unit that cannot be adjusted in the lease period is .

4. The scope configuration information includes scope IP address range, scope name, reservation and exclusion. (no DHCP server address)

5. When creating a new scope, the information that must be entered is the start IP address and end IP address.

(2) exclude

6. Exclude is the IP address not assigned by the DHCP server.

7. The exclusion range is 有限the sequence of IP addresses excluded from the DHCP service within the scope. To add an excluded IP address range, you only need to enter the start IP address and the end IP address. If you want to exclude a single IP address, you only need to enter the start IP address (the IP address in the end S is omitted). 添加排除It is not necessary to obtain client MAC地址information. (required when adding reservations)

(3) lease

8. The lease is the length of time specified by the DHCP server during which the client can use the assigned IP address (cannot control the user's online time). The lease duration determines when the lease expires and how often the client needs to renew it with the server.
(4) reserved

9. Use Reservation to create a permanent address lease assignment through the DHCP server to the client 可以释放该租约. Reserved addresses can be used from scoped address ranges 任何IP地址(including evicted IP address sequences). Reservation ensures that the specified hardware devices on the subnet are always available for use 相同的 IP 地址.

10. 新建保留:When creating (adding) a reservation, you need to enter the reservation name, IP address, MAC address , description and support type and other items. (no subnet mask)

(6) lease

11. 续约:The default address lease period is 8 days, and the client needs to renew the lease before the lease expires, and the renewal is automatically completed by the client software. The minimum adjustable unit for address lease duration is minutes .

12. When the client computer and the DHCP server are in the same network segment, use the network segment where the subnet received from the DHCP message is located to assign an IP address. 不在同一网段时, select the subnet segment where the "DHCP Discovery" message is forwarded 中继(relevant fields in the message need to be modified). When receiving the non-relay forwarded "DHCP Discovery" message, it will select the network segment where the subnet receiving the "DHCP Discovery" message is located to allocate an IP address (not optional).

Relevant real questions over the years

Question 6: When adding exclusions to the DHCP server under the Windows 2003 system, the information that should be entered is ( ).

A. Starting IP address and ending IP address

B. Starting IP address and gateway address

C. Starting IP address and MAC address

D. Starting IP address and mask

Correct answer: A
Reference analysis:
When adding exclusions in the DHCP server, yes 输入要排除的IP地址范围的起始IP地址和结束IP地址. If you want to exclude one 单独的IP地址, 只需要输入起始IP地址.

Question 45: Among the following options, which must be entered when adding exclusions to the DHCP server in the Windows 2003 system ( ).

A. Starting IP address

B. End IP address

C. Subnet mask

D. Exclude name

Correct answer: A
Reference analysis:
Enter the start IP address and end IP address when adding exclusion to the DHCP server in the Windows 2003 system, and omit the end IP address when excluding a single address. So choose option A

Question 29: In the following description about the DHCP server under the Windows 2003 system, the wrong one is ()

A. The minimum adjustable unit of the address lease term is minutes

B. When adding exclusions, you must enter the start IP address and end IP address

C. The client's address lease renewal is automatically completed by the client software

D. After creating a new scope, the scope must be activated to assign an IP address to the client

Correct answer: B
Reference analysis: 添加排除的IP地址可以是一个地址范围也可以是一个IP地址。如果排除一个IP地址,则只需要在“起始IP地址”中输入该地址即可,不必输入结束IP地址。Therefore, option B is wrong, so choose option B.

Question 40: In the following description about the DHCP server under the Windows2003 system, the error is ().

A. When adding exclusions, you need to obtain the MAC address information of the client

B. Reservation refers to the permanent address lease assigned by the DHCP server

C. The client's address lease renewal is automatically completed by the client software

D. If the network mainly includes desktop computers with fixed locations, a longer lease period should be set

Correct answer: A
Refer to the analysis:
when adding exclusions, you need to add the start IP address and end IP address of the exclusion, and do not need to obtain the MAC address information of the client, so choose option A.

Question 32: When creating a new scope in the DHCP server, during the lease period 不可调整的时间单位是( ).

A., week

B. day

C. hours

D. minutes

Correct answer: A
Reference analysis: When creating a new scope in the DHCP server, the default limit in the lease period is 8 days, 0:00, and 0:00. The time unit of week does not appear, so the week cannot be adjusted. Therefore choose option A.

Question 8: In the following description of the DHCP server parameters under the Windows 2003 system, 错误的是 ( ).

A. A scope is a contiguous range of IP addresses on the network

B. Exclusions are limited sequences of IP addresses that are excluded from the scope

C. Reserve and 不可以use the IP address sequence that was excluded

D. The address pool is the remaining IP addresses after the scope application excludes the range

Correct answer: C
reference resolution: When configuring the DHCP service, 保留地址可以使用作用域地址范围中的任何IP地址. Therefore, the description of option C is wrong, so the correct answer to this question is C.

Question 11: In the following description about the DHCP server under the Windows 2003 system, 错误的是( ).

A. The lease term determines how frequently the client renews the lease to the server

B. A scope可负责多个网段IP地址的分配

C. The address pool is the remaining IP addresses after the scope application excludes the range

D. Reserve to ensure that the specified device on the subnet always uses the same IP address

Correct answer: B
Reference analysis: The lease term determines when the lease expires and how often the client needs to update it to the server. 作用域是网络上IP地址的完整连续范围,并不负责IP地址分配. After defining a scope and applying exclusions, the remaining addresses form a usable "address pool" within the scope. "Reserve" can be used to create a permanent address lease assigned by the DHCP server, and some specific IP addresses can be reserved for permanent use by the client. So choose option B.

Question 13: In the following description about the Windows 2003 system DHCP server, 正确的是( ).

A. After creating a new scope, you can assign an address to the client

B. The address pool is the remaining IP addresses in the scope except reserved

C. The client's address lease renewal is automatically completed by the client software

D. 保留仅可使用IP addresses in the address pool

Correct answer: C
Reference Analysis:
The scope is the continuous range of IP addresses on the network. After the scope is created 必须激活才可为客户机分配地址, option A is wrong. 地址池是作用域应用排除范围之后剩余的IP地址, option B is wrong. Reserved addresses can use the D option error in scoped address ranges 任何IP地址. The client's address lease renewal is done automatically by the client software. Therefore option C is correct.

Question 15: In the following description about the Windows 2003 system DHCP server, 错误的是( ).

A. When the DHCP server is responsible for allocating IP addresses on multiple network segments, multiple scopes need to be configured

B. When the client and the DHCP server are not in the same network segment, the DHCP relay is required to forward the DHCP message

C. When the DHCP relay forwards the DHCP discovery message, it needs to modify the relevant fields in the message

D. When the DHCP relay forwards the client's message,仍使用广播方式发送给DHCP服务器

Correct answer: D
Reference resolution:
The scope is the complete and continuous range of IP addresses on the network. A scope is usually defined as a single physical subnet on a network that receives DHCP services. For multiple network segment IP addresses, multiple scopes need to be configured. When the client computer and the DHCP server are in the same network segment, the IP address is allocated using the network segment where the subnet received from the DHCP message is located. Otherwise, select the subnet segment where the relay forwarding the DHCP discovery message is located. In this case, the DHCP server needs to configure multiple scopes to be responsible for the allocation of IP addresses on multiple network segments. When the DHCP relay forwards the client's message, because the client already has an IP address and the DHCP address has been informed, it can be used 端到端的传递方式, so option D is wrong.

Question 18: In the following description about the DHCP server under the Windows 2003 system, 错误的是( ).

A. Multiple scopes need to be configured when assigning IP addresses to multiple network segments

B. When adding a reservation, you need to obtain its MAC address information on the DHCP client

C. Reservation refers to the permanent address lease assigned by the DHCP server.不能释放该租约

D. When receiving a "DHCP Discovery" message forwarded by a non-relay, select the network segment where the subnet receiving the message is located to assign an IP address

Correct answer: C
Reference resolution: Each scope needs to set an assignable IP address, so when the DHCP server is responsible for IP address allocation of multiple network segments, multiple scopes need to be configured. When adding a reservation, you need to enter the reservation name, IP address, MAC address, description and support type, etc. 保留是指确保DHCP客户端永远可以得到同一IP地址,客户端可以释放该租约. When receiving a "DHCP Discovery" message forwarded by a non-relay, it will select the network segment where the subnet receiving the "DHCP Discovery" message is located to allocate an IP address. Therefore, option C is wrong.

Question 22: In the following description about DHCP server configuration under Windows2003 system, 错误的是( ).

A. When exclusion and reservation are not added, the server can dynamically assign the IP address in the address pool to the DHCP client

B. The term of the address lease determines the length of time for the client to use the obtained IP address

C. When adding exclusions and reservations均需获得客户机的MAC地址信息

D. Reservation refers to the permanent address lease assigned by the DHCP server

Correct answer: C

Reference analysis: In the [Add Exclusion] configuration interface of the DHCP server, you only need to enter the limited IP address sequence to be excluded from the scope, 无须获得客户端的MAC地址信息. Therefore, option C is incorrect.

Question 31: Among the following information, what needs to be entered when creating a new reservation in the DHCP server is ( ).
Ⅰ.IP address Ⅱ.Subnet mask Ⅲ.MAC address

A, I, II

B. Only I, III

C, only II, III

D、I、Ⅱ、Ⅲ

Correct answer: B
Reference analysis: When creating a new reservation in the DHCP server, 保留名称、IP地址、MAC地址、描述和支持类型options such as input are required. So choose option B.

Question 35: When creating a new reservation in the DHCP server, 不能选择的支持类型是( )

A、 ARP

B、BOOTP

C、DHCP

D. DHCP and BOOTP

Correct answer: A
Refer to analysis:
BOOTP: This protocol is based on TCP/IP protocol, which allows diskless stations to obtain IP addresses from a central server, and assign dynamic IP addresses to diskless workstations in the LAN. It is not necessary to set static IP addresses for each user. Dynamic Host Configuration Protocol DHCP is a LAN network protocol, using UDP protocol to work, there are two main purposes: to the internal network or network service providers to automatically assign IP addresses to users to internal network administrators as a means of central management of all computers. ARP地址解析协议是主机在发送帧前将目标IP地址转换成目标MAC地址的过程。不能动态的分配IP地址, option A is in line with the meaning of the question, so choose option A.

Question 43: In the following description about the "reservation" of the DHCP server under the Windows2003 system, the error is ().

A. Reservation can support both DHCP and BOOTP

B. When creating a new reservation, you need to enter the MAC address of the client

C. The reserved address can use any address within the scope address range

D. After the client obtains the reserved IP address,其地址租约不需续订

Correct answer: D
Reference resolution:
The default address lease period is 8 days, 租约到期前客户端需要续订and the renewal work is automatically completed by the client.

Question 48: Among the following information, 不属于DHCP服务器作用域配置信息的是( ).

A. DHCP server address

B. Scope IP address range

C. to keep

D. to exclude

Correct answer: A
reference resolution:
DHCP server scope configuration information has a scope IP地址范围、作用域名称、保留、排除. So choose option A.

Question 51: In the following description about the configuration and use of the Windows 2003 system DHCP server, the error is ( ).

A. The minimum adjustable unit of the address lease term is minutes

B. When the network mainly includes desktop computers with fixed locations, a longer lease period should be set

C. After creating a new scope必须添加保留和排除后才可为客户机分配地址

D. The client's address lease renewal is automatically completed by the client software

Correct answer: C
Reference analysis:
作用域激活后,Only the DHCP server can assign addresses to clients.
So choose option C.

Question 58: In the following description about the DHCP server under the Windows 2003 system, 错误的是( ).

A. The server can assign IP addresses to multiple network segments

B. Multiple address pools must be configured when assigning IP addresses to multiple network segments

C. When receiving a DHCP discovery message that is not forwarded by a DHCP repeater, choose an IP address for the client

D. When receiving the DHCP discovery message forwarded by the DHCP relay, allocate an IP address from the address pool where the relay is located

Correct answer: C
Reference resolution:
When receiving a DHCP discovery message that is not forwarded by a DHCP repeater, 会选择收到"DHCP发现"消息的子网所处的网段分配IP地址. So choose option C.

Question 64: In the following description about the DHCP server under the Windows 2003 system, the error is ( ).

A. The scope address range is a set of consecutive IP addresses

B. The exclusion is the IP address not assigned by the DHCP server

C. Reservation ensures that specified devices on the subnet use the same IP address

D. 添加保留时You must enter the reserved start IP address and end IP address

Correct answer: D
Reference analysis:
In the Windows 2003 system, the DHCP server 添加排除时enters the start IP address and the end IP address. When excluding a single address, the end IP address is omitted.

Question 67: In the following description about the "exclusion" and "reservation" of the DHCP server under the Windows 2003 system, the error is ( ).

A. The exclusion address is one or a group of consecutive IP addresses within the scope address range

B. Without adding exclusion and reservation, the server can also dynamically assign the IP address in the address pool to the DHCP client

C. When adding exclusions, 必须输入the start IP address and end IP address

D. Add and reserve the MAC address of the DHCP client that needs to be obtained

Correct answer: C
[Analysis] Enter the start IP address and the end IP address when adding exclusion to the DHCP server in the Windows 2003 system. When excluding a single address, the end IP address is omitted.

Question 73: Among the following commands, the command to view the DNS server address information obtained by the DHCP client is ( ).

A、 ipconfig /displaydns

B、ipconfig /renew

C、 ipconfig /flushdns

D、ipconfig /all

Correct answer: D
Reference analysis:
1. The ipconfig/displaydns command can query all cached information of the client DNS.
2. The ipconfig/renew command can obtain a new address lease from the DHCP server again.
3. The ipconfig/flushdns command can refresh the DNS cache.
4. The ipconfig/all command can check the address lease obtained by the client and other configuration information. So choose option D.

Question 75: Among the following descriptions about the DHCP server of the Windows 2003 system, the correct one is ( ).

A. Client's address lease renewal是DHCP服务器发起的

B. When adding and excluding continuous address segments, you must enter the start IP address and end IP address

C. The minimum adjustable unit of the address lease term is小时

D. It is necessary to obtain the MAC address information of the DHCP client when adding exclusions and reservations

Correct answer: B
Reference resolution:
When adding exclusions in the DHCP server, you can enter the start IP address and end IP address of the IP address range to be excluded. If you want to exclude a single IP address, you only need to enter the starting IP address. The default lease period is set to 8 days, and the client needs to renew before the lease expires, 续订工作由客户端自动完成, the address lease period 最小可调整单位是分钟. 在添加保留时It is necessary to obtain the IP address and MAC address information of the DHCP client. So choose option B.

Question 80: In the following description about the DHCP server of the Windows system, 错误的是( ).

A. Reservation refers to the permanent address lease assigned by the DHCP server

B. Address lease renewal is initiated by the DHCP client

C. The minimum adjustable unit of the address lease term is minutes

D. 需要Obtain the DHCP client's information when adding exclusionsMAC地址信息

Correct answer: D
Reference analysis:
When adding exclusions to the DHCP server in the Windows 2003 system, enter the start IP address and the end IP address. When excluding a single address, the end IP address is omitted. 不需要获取DHCP客户机的MAC地址信息. So choose option D.

Guess you like

Origin blog.csdn.net/guanguan12319/article/details/129299010