Network Application Technician Skills Examination Questions (2)

♥️Author : Xiao Liu at Station C

♥️Personal homepage:  Xiao Liu's homepage 

♥️Efforts may not necessarily pay off, but there will be gains! Come on! Work hard together for a better life!

♥️ Learn the operation and maintenance experience summed up in two years, and a full set of network experiment tutorials for Cisco simulators. Column: Cloud Computing Technology

♥️Xiao Liu private message can ask casually, as long as you know it, you will not be stingy, thank you CSDN for letting you and me meet!

 41. Assuming that there is a LAN, all managed devices are polled every 10 minutes, the processing time of management messages is 50ms, the network delay is 1ms, there is no obvious network congestion, and the time required for a single poll is about 0.2s, then the The management station can support up to ( ) devices.

     A. 4500      B. 4000     C. 3500     D. 3000

  42. A certain host can ping the gateway, but when pinging the IP address of the host on the external network, it displays "The target host is unreachable". The reason for this failure may be ( ).

A. The local TCP/IP protocol is installed incorrectly B. The domain name service is not working properly

C. Gateway routing error D. Local routing error

43. The SNMP service programs in the Windows system include SNMPService and SNMPTrap. Among them, SNMPService receives SNMP request message. Send a response message according to the requirements; and the function of SNMPTrap is ( ).

A. Process the trapped information on the local computer B. The managed object detects an error and sends it to the management station

C. Receive trap messages from local or remote SNMP agents D. Process trap messages from remote computers

44. Among the following IP addresses, the one that can be used as the host IP address is ( ).

A. 92.168.15.255/20        B.  172.16.23.255/20    

C. 172.20.83.255/22        D. 202.100.10.15/28

45. The scope of DR in the OSPF protocol is ( ).

A. An area B. A network segment C. A router D. A network running OSPF protocol

  46. ​​Among the four timers defined by GVRP, the default value is the smallest ( ).

 A. Hold timer B. Join timer C. Leave timer D. LeaveAll timer

47. ( ) means that the VLAN configuration information on a switch can be propagated and copied to other switches connected in the network.

A. Trunk port B. VLAN trunk C. VLAN transparent transmission D. SuperVLAN

48. Which of the following statements about BGP is correct ( ).

      A. BGP is a link state protocol B. BGP advertises routing information through UDP

C. BGP calculates network cost based on delay D. BGP can detect routing loops

49. The transmission medium used by Fast Ethernet 100BASE-T4 is ().

     A. UTP Category 3 B. UTP Category 5 C. Optical Fiber D. Reel Cable

50. The medium access technology adopted by CSMA/CD belongs to resource ( ).

     A. Rotational use B. Fixed allocation C. Competitive use D. Demand-based allocation

2. Multiple-choice questions (fill in the brackets with the correct letter of the selected answer, 1 point for each question, 40 points in total)

1. Regarding the compressed expression of the IPv6 address 2001:0410:0000:0001:0000:0000:0000:45FF, which of the following is correct ( ).

A. 2001:410:0:1:0:0:0:45FF        B. 2001:41:0:1:0:0:0:45FF

C. 2001:410:0:1::45FF             D. 2001:410::1::45FF

2. XZ Company requires to build its network based on the modular enterprise network architecture. XZ company has 1 research and development base in Shenzhen and Xi'an; one office building in Beijing and Shanghai; offices with more than 50 people in 23 provincial capital cities; small offices with no more than 8 people in 200 small and medium cities; At any one time there are usually more than 200 marketing and technical personnel on business trips. Due to environmental and cost issues, some offices do not have access to headquarters via leased lines or PSWAN connections. According to these circumstances, the network module that XZ company should have is ( ).

A. Large branch office network B. Leased line/packet switched access

C. Remote/distributed office D. VPN access

3. The functions implemented by the IPv6 Neighbor Discovery Protocol include ( ).

A. Address Resolution B. Router Discovery C. Address Auto-Configuration D. Relational Address Duplication Detection

4. After enabling DHCP on the router RTA, you need to set the address range of the address pool to 192.168.1.0/24, and the default gateway address assigned to the host is 192.168.1.254. Which of the following configurations can satisfy these requirements ( ).

A. [Router] dhcp server ip-pool 0

B. [Router-dhcp-pool-0] network 192.168.1.0 mask 255.255.255.0

C. [Router-dhcp-pool-0] gateway-list 192.168.1.254

D. [Router-dhcp-pool-0] dns-list 192.168.1.10

5. In the routing table of an MSR router, there may be routes from which of the following sources ( ).

A. Routes for directly connected network segments B. Static routes manually configured by network administrators

C. Routes discovered by dynamic routing protocols D. Routes discovered by network layer protocols

6. The Serial0/0 interface of the router MSR1 of XYZ Shenzhen Branch is directly connected to the Serial0/0 interface of the ISP router MSR2 through the WAN line, and the address of the Serial0/0 interface of MSR2 is 100.126.12.1. XYZ Company can access the website of the Beijing head office at 202.102.100.2 through this ISP. There is no routing protocol running on MSR1, only the following static route is configured: ip route-static 202.102.100.2 24 100.126.12.1 Then which descriptions about this route and MSR1 routing table are correct ( ).

A. If the address of the network segment where 100.126.12.1 is located is unreachable, the route will not be written into the routing table

B. As long as the physical status of the outgoing interface corresponding to the route is up, the route will be written into the routing table

C. If the outgoing interface corresponding to the route is disconnected, the route will be deleted from the routing table

D. This is a static route with a priority of 60 and a cost of 0

7. The customer's network connection is like: HostA------MSR-1------MSR-2---------MSR-3------HostB

IP addresses have been configured on all devices. To realize that HostA can access HostB, which of the following statements about routing configuration are correct ( ).

A. At least one static route needs to be configured on MSR-1

B. At least one static route needs to be configured on MSR-2

C. At least two static routes need to be configured on MSR-2

D. At least one static route needs to be configured on MSR-3

8. HostA--GE0/0--MSR-1--S1/0-----WAN-----S1/0--MSR-2--GE0/0--HostB has It is known that the IP address of interface GE0/0 of MSR-2 is 2.2.2.1/24, the network is running normally, and hosts HostA and HostB on both sides can communicate with each other. Now configure the following routing on MSR-2: ip route-static 2.2.2.1 24 NULL0 then ().

A. HostA can still ping 2.2.2.1 B. HostA cannot ping 2.2.2.1

C. You can still ping 2.2.2.1 on MSR-1 D. You cannot ping 2.2.2.1 on MSR-1

9. Xiao L is a senior network technical engineer. He wants to independently design a relatively perfect IGP routing protocol. He hopes that the routing protocol will have a greater improvement in Cost. When designing the Cost of the routing protocol, which of the following should be considered factor ( ).

A. Link bandwidth B. Link MTU C. Link reliability D. Link delay

10. Which of the following descriptions about routing is correct ( ).

A. Route convergence means that the routing expressions of routers in the entire network are consistent

B. A complete route must at least include mask, destination address, next hop

C. The priority of the direct route cannot be modified manually

D. IGP is a routing protocol based on DV algorithm

11. A routing protocol is a link-state routing protocol, which of the following characteristics should this routing protocol have ( ).

A. The routing protocol cares about the state of links or interfaces in the network

B. The router running the routing protocol will form a weighted directed graph containing each destination network segment based on the collected link state information

C. The routing protocol algorithm can effectively prevent loops

D. The routing protocol periodically sends update messages to exchange routing tables

12. Which of the following statements about the OSPF area (Area) in the network is correct ( ).

A. A router in the network may belong to multiple different areas, but one of the areas must be the backbone area

B. A router in the network may belong to several different areas, but none of these areas may be the backbone area

C. Only OSPF routers in the same area can establish neighbors and adjacencies

D. Routers in multiple OSPF areas in the same AS share the same LSDB

13. For RIPv1 and RIPv2 running on MSR routers, which of the following statements are correct ( ).

A. The destination network segment of the route learned on the RIPv1 router must be a naturally classified network segment

B. The destination network segment of the route learned on the RIPv2 router must be a subnet address with a variable-length mask

C. Both RIPv1 and RIPv2 can learn the routes of natural classification network segments

D. Both RIPv1 and RIPv2 can learn routes of non-naturally classified network segments, such as routes whose destination network segment is 10.10.200.0/22

14. The customer's network is composed of two MSR routers interconnected. The RIPv1 protocol is running between the two MSRs. At present, the dynamic route learning has been completed and the remote route has been learned. Now the customer will modify RIPv1 to RIPv2, then it will Which of the following possible changes occur ( ).

A. The mask length of the remote route learned on the router may change

B. The way routers send RIP packets may change

C. The time interval for sending RIP update packets on the router will change

D. The routing entries in the routing table on the router may change

15. Customer router MSR-1 configures MP to connect to MSR-2 through interfaces S0/0 and S0/1, and MP is running normally now. At the same time, the two routers run RIP to complete the route learning of the LAN segment of the two routers, then the Metric value of the RIP route learned on MSR-1 may be ( ).

A. 2M       B. 4M     C. 2         D. 1

16. The two MSR routers MSR-1 and MSR-2 are connected through the WAN and dynamically complete the remote route learning through RIPv2. After 2 minutes of stabilization, MSR-1 receives a RIP update packet from MSR-2, which contains a route with a cost of 14, then ( ).

A. If there is no such route in the routing table of MSR-1, then the route must be added to the routing table of MSR-1

B. If the routing table of MSR-1 originally has this route, and its Cost is less than 14, then the routing entry will not be updated on MSR-1

C. If the routing table of MSR-1 originally has this route, the routing entry will be updated only when its Cost is greater than 14

D. If the same route received from the neighbor originally exists in the routing table of MSR-1, and its Cost is less than 14, the route will also be updated

17. To check the comprehensive information of the routing table on the MSR router, such as the total number of routes, the number of RIP routes, the number of OSPF routes, the number of active routes, etc., which of the following commands can be used ( ).

A. <MSR>display ip routing-table statistics

B. [MSR-GigabitEthernet0/0]display ip routing-table statistics

C. [MSR] display ip routing-table

D. [MSR] display ip routing-table accounting

18. In the routing table of the router, there is a route whose network segment is 10.168.100.0/24, whose Cost is 15 and Preference is 100, so which of the following statements about this route are correct ( ).

A. This route may be a manually configured static route

B. This route may be a route discovered dynamically through RIP

C. If this is a RIP route, then the route is an invalid route

D. This route must be learned through dynamic routing

19. In the routing table of the router, there is a route whose network segment is 10.168.100.0/24, its Cost is 20, and its Preference is 255, so which of the following statements about this route are correct ( ).

A. This route must be learned through dynamic routing

B. The priority of this route is the highest value, which means any route from an untrusted source

C. Cost 20 indicates that the hop count of the route is 20

D. This is a valid dynamic route

20. Execute display ip routing-table on the router, then the next-hop interface displayed in the routing table may be ( ).

A. InLoop0     B. Null0     C. Serial 6/0/1     D. Vlan500

21. In the routing table of an MSR 30 router, it is found that the cost value of the route to the destination network segment 61.232.200.253/22 is 16, then the correct description of this routing entry is ( ).

A. If the route was learned through the RIP protocol, the route may be suppressed

B. The route may be a static route

C. If the route is learned through the RIP protocol, then it is possible that the network 61.232.200.253/22 has failed

D. The route can only be a dynamic route

22. The WAN link between the two routers MSR-1 and MSR-2 adopts the PPP protocol, and RIP is configured on the two routers to advertise routing information to each other. At present, the RIP route advertised by MSR-2 can be seen on MSR-1, but no RIP route can be seen in the routing table of MSR-2, the possible reason is ( ).

A. MSR-1 only starts RIP on the WAN interface, but does not start RIP on other interfaces

B. The RIP versions of the two routers are inconsistent

C. RIP of MSR-1 is configured with silent-interface all

D. RIP of MSR-2 is configured with silent-interface all

23. The transmission methods in data communication include ( ).

  A. Time-sharing transmission B. Segmented transmission C. Serial transmission D. Parallel transmission

24. For ( ) in the network, user accounts are managed by "local users and groups".

  A. Client B. Member server C. Domain controller D. Member controller

25. In serial data transmission, there are several configuration methods for data lines ( ).

 A. Simplex communication B. Full-duplex communication C. Half-duplex communication D. Full-duplex communication

26. The local area network switch is used in the local area network, ().

  A. Used to connect terminal equipment B. Provide high-speed independent communication channel

  C. Provide low-speed independent communication channels D. Provide high-speed shared communication channels

27. Which of the following statements is correct ( ).

  A. All switches have 2 fiber ports

  B. When using optical fiber port cascading, there must be 2 optical fiber jumpers

  C. When the fiber optic port is successfully connected, the LED indicator is red

  D. When using optical fiber port cascading, only one optical fiber jumper is required

28. According to the application deployment location of the firewall, it is divided into ( ).

  A. Perimeter Firewall B. Personal Firewall

  C. Hybrid firewall D. Application proxy firewall

29. Which of the following statements is correct ( ).

  A. Encryption is the process of converting data information into an unrecognizable form

B. The process of converting ciphertext into plaintext is decryption

  C. The process of encryption and decryption forms an encryption system

  D. The purpose of encryption is to prevent people who should not know the data information from knowing and identifying

30. The two routers MSR-1 and MSR-2 are interconnected through the S0/0 interface, and the two routers learn the route of the LAN segment from each other by running the RIP protocol. See the following configuration command on MSR-1: [MSR-1-Serial0/0] rip authentication-mode md5 rfc2453 H3C

Then the correct interpretation of this command is ( ).

A. Configure RIP to use MD5 plaintext authentication

B. Configure RIP to use MD5 ciphertext authentication

C. Specify MD5 verification to use the message format specified in RFC2453

D. Specify MD5 authentication to use the H3C proprietary extended protocol packet format

31. Multiple wide area network protocols and routing protocols need to be used in a large financial network. In order to enhance network security, it is hoped that the selected protocol has security measures such as authentication, encryption, and access control. Then when choosing WAN protocol and routing protocol, which of the following protocols may meet the requirements ( ).

A. PPP     B. HDLC     C. RIPv2    D. RIPv1

32. Two MSR routers with no configuration are directly connected back to back through their respective WAN Serial1/0 interfaces, and their interconnection network segment is 192.0.0.0/24. At the same time, the two routers are connected to their respective LAN segment users through their respective GigabitEthernet0/0: HostA----GE0/0--MSR-1--S1/0---------S1/0-- MSR-2--GE0/0--HostB configures RIPv1 on the two routers. Now both routers have learned the RIP route of the peer LAN segment. So which of the following statements is true ( ).

A. If the LAN segment of one of the routers is 10.0.0.0/24, then the routing table of the other router will learn the route of 10.0.0.0/8

B. The way of exchanging RIP packets between two routers is broadcast

C. The RIP packets between the two routers are still based on UDP transmission

D. You can configure RIP RADIUS authentication on the WAN interfaces of the two routers to enhance network security

33. Two empty configuration MSR routers MSR-1 and MSR-2 are interconnected through their respective GE0/0, and their IP addresses are 192.168.1.2/30 and 192.168.1.1/30 respectively. Then add the following configuration on both routers:

[MSR-ospf-1]area 0;[MSR-ospf-1-area-0.0.0.0]network 192.168.1.1 0.0.0.3

The OSPF Router IDs of the two routers are their respective GE0/0 interface addresses, and there is no other configuration on the two routers. To ensure that MSR-1 becomes the OSPF DR in the next election, which of the following configurations ( ) needs to be added.

A. Configure on MSR-1: [MSR-1-GigabitEthernet0/0]ospf dr-priority 255

B. Configure on MSR-2: [MSR-2-GigabitEthernet0/0] ospf dr-priority 0

C. Configure on MSR-1: [MSR-1-ospf-1]ospf dr-priority 255

D. Configure on MSR-2: [MSR-1-ospf-1] ospf dr-priority 0

34. Which of the following statements about OSPF information display and debugging commands is correct ( ).

A. You can view the OSPF neighbor relationship of the router through the display ospf peer command

B. Use the display ospf lsdb command to view the link state database of the router. The link state database of all OSPF routers in the network should be the same

C. Use the display ospf routing command to view the OSPF routing of the router, not all OSPF routes will be added to the global routing table

D. View OSPF error information through display ospf fault

35.NAPT mainly converts the ( ) information of the data packet.

A. Data Link Layer B. Network Layer C. Transport Layer D. Application Layer

36. Among the following statements about Easy IP, the correct one is ( ).

A. Easy IP is a special case of NAPT

B. When configuring Easy IP, it is not necessary to configure ACL to match packets that need to be converted by NAT

C. No need to configure NAT address pool when configuring Easy IP

D. Easy IP is suitable for NAT device dial-up or dynamic acquisition of public IP address occasions

37. The following ACL is configured on a router: acl number 2000 match-order auto, rule 0 deny, rule 5 permit source 192.168.9.0 0.0.7.255 Assuming that the ACL is applied to the correct interface and in the correct direction, then _( ).

A. The data flow sent by the source network segment of 192.168.15.0/24 is allowed to pass

B. The data flow sent by the source network segment of 192.168.9.0/21 is allowed to pass

C. The data flow sent by the source network segment of 192.168.9.0/21 is forbidden to pass through

D. The data flow sent by the source network segment of 192.168.9.0/22 ​​is forbidden to pass through

38. The following ACL is configured on the MSR router: acl number 3999, rule permit tcp source 10.10.10.1 255.255.255.255 destination 20.20.20.1 0.0.0.0 time-range lucky then the correct understanding of this ACL is ( ).

A. The rule only takes effect during the lucky time period

B. This rule only matches packets originating from 10.10.10.1

C. The rule only matches packets destined for 20.20.20.1

D. This rule can match TCP packets from any source network segment

39. Which of the following statements about HDLC is correct ( ).

A. The HDLC protocol is a bit-oriented transport layer protocol.

B. Any bit stream can be transmitted transparently on the HDLC link.

C. The HDLC protocol adopts a unified frame format, so whether it is a data packet or a protocol packet, it is transmitted on the HDLC link with a frame of a standard format.

D. HDLC can run on synchronous/asynchronous links, so it has a wide range of applications

40. Which of the following descriptions of PPP PAP authentication is correct ( ).

A. PAP authentication is a two-way handshake protocol B. PAP usernames are in clear text, but passwords are confidential

C. The user name of PAP is in cipher text, and the password is in plain text. D. The user name and password of PAP are both in plain text.

♥️Following is the driving force for my creation

♥️Like, is the greatest recognition for me

♥️This is Xiaoliu, I am inspiring to do every article well, thank you everyone

Guess you like

Origin blog.csdn.net/lzl10211345/article/details/132010777