Analysis of real questions and answers in the morning for network engineers in the first half of 2023

1. The storage medium of solid-state hard disk is ( ).

A. CD-ROM B. Flash memory C. Floppy disk D. Diskette

2. Virtual storage technology combines ( ) organically to obtain a larger capacity "memory".

A. Memory and external memory B. Cache and memory C. Register and Cache D. Cache and external memory

3. Among the following interface protocols, the one that does not belong to the hard disk interface protocol is ( ).

A.IDE    B.SATA    C.SPI    D.SCSI

4. The resources requested by the process are satisfied, and the state of the process can be changed from ( ).

A. Running state changes to ready state B. Running state changes to waiting state C. Ready state changes to running state D. Waiting state changes to ready state

5. Which of the following operating systems is not a domestic operating system ( )

A.CentOs    B.Deepin   C.NeoKylin   D.HarmonyOS

6. The use of multi-programming can effectively improve the ( ) of CPU, memory and I/O devices.

A. Flexibility B. Reliability C. Compatibility D. Utilization

7. In the life cycle of network engineering, the understanding and analysis of user needs is in the ( ) stage.

A. Requirements analysis B. Design C. Implementation D. Operation and maintenance

8. Among the following tools and software, which is not a common tool for network operation and maintenance is ( ).

A.SecureCRT    B.WireShark    C.Putty    D.Eclipse

9. Among the following descriptions, the one that does not comply with the "Network Security Law of the People's Republic of China" is ( ).

A. Network products should meet the mandatory requirements of relevant national standards

B. Network operators can decide the retention time of network logs according to business needs

C. Network operators should formulate emergency plans for network security incidents

D. Network operators should follow the principles of legitimacy and necessity in collecting personal information

10. For information systems that will cause particularly serious damage to national security after being damaged, security planning should be carried out in accordance with the requirements of level ( ) protection.

A. Two B. Three C. Four D. Five

11. Which of the following does not belong to the twisted pair test parameters is ( ).

A. Near-end crosstalk B. Attenuation C. Packet loss rate D. Equivalent far-end crosstalk

12. The following types of connectors that do not belong to optical fiber jumpers are ( ).

A.FC    B.LC    C.SC    D.SEP

13. The main function of Modem is ( ).

A. Digital-to-analog conversion B. Routing and forwarding C. Authentication D. Address translation

14. The data encoding method adopted by Fast Ethernet is ( ).

A. Manchester B.64B/66B C.8B/10B D.4B/5B

15. If the noise-free ideal channel bandwidth using QAM modulation is 2MHz, and the maximum data transmission rate is 28Mbps, then the modulation method used by this channel is ( ).

A.QAM-128 B.QAM-64 C.QAM-32 D.QAM-16

16. In my country's commercial encryption algorithm system, ( ) belongs to the digest algorithm.

A.SM2   B.SM3    C.SM4    D.SM9

17. When using the Traceroute command, the Type and Code in the ICMP timeout message returned by the intermediate router are ( ) respectively.

A.Type=3 Code=0    B.Type=8 Code=0    C.Type=11 Code=0    D.Type=12 Code=0

18. In EPON (Ethernet Passive Optical Network, Ethernet Passive Optical Network), if the home gateway or switch at the user end is provided by the operator and performs VLAN management uniformly, then the VLAN operation mode on the UNI port is preferentially configured as ( ).

A.Mark mode B.Transparent mode C.Trunk mode D.Translation mode

19. In the IEEE standard system, the standard corresponding to WiFi 6 is ( ).

A.802.11ac    B.802.11n   C.802.11b   D.802.11ax

20. During the three-way handshake of TCP connection establishment, assuming that the sequence number field in the SYN segment sent by the client is a, the confirmation number in the SYN+ACK segment replied by the server is ( ).

Aa B.a+1 C.a+20 D. Random value

21. In the OSI reference model, it is responsible for compressing application layer messages, and the level of encryption function is ( ).

A. Transport layer B. Session layer C. Presentation layer D. Application layer

22. In the TCP congestion control mechanism, the purpose of fast retransmission is to allow the host to recover quickly before the timer expires, and the trigger condition is ( ).

A. The timer expires B. The congestion window exceeds the threshold C. The ACK of the message is received D. Three redundant ACKs are received

23.24. In the RIP protocol, the default maximum metric value is ( ) hops. In addition to setting the maximum metric value, ( ) can also be used to prevent routing loops.

A.15    B.16   C.32    D.64

A. Horizontal split and vertical flip B. Horizontal split and route poisoning  

C. Vertical Flip and Routing Poison D. Vertical Flip and Poison Reversal

25.26. A router running the OSPF protocol sends a Hello message to each interface every ( ) second, and the function of this message does not include ( ).

A.10    B.20    C.30   D.40

A. Discover and establish neighbor relationship B. Elect DR/BDR C. Establish two-way communication relationship D. Synchronize database

27. The following routing protocol used between AS is ().

A.RIP    B.OSPF    C.BGP   D.IS-IS

28. In the following description about telnet, the incorrect one is ().

A.telnet supports command mode and session mode B.telnet uses clear text transmission

C.telnet default port is 23 D.telnet uses UDP protocol

29. Among the following statements about DHCP service, the correct one is ().

A. The DHCP server can remotely operate the client, turn on or turn off the service

B. In the same subnet, there can be only one DHCP server

C. In the DHCP service domain, you can ensure that the workstation uses a fixed IP address

D. The DHCP client needs to configure the correct server address to use the DHCP service

30. The control protocol of WWW is ( ).

A.FTP    B.HTTP    C.SSL    D.DNS

31. The following protocol for receiving e-mail is ( ).

A. SMTP    B. SNMP    C. ICMP    D. POP3

32. To query the authoritative domain name server information in the DNS domain, you can view ( ) resource records.

A.SOA    B.NS    C.PTR    D.A

33. The prefix of the IPv6 multicast address is ( ).

A. FF    B. FE    C. FD    D. FC

34.35. In the Linux operating system, () is usually used as the Web server, and the directory of its default Web site is ().

A.IIS    B.Apache    C.NFS    D.MySQL

A./etc/httpd     B./var/log/httpd    C./etc/home    D./home/httpd

36. In order to facilitate the remote maintenance of the Windows Server2008R2 server by the operation and maintenance personnel, the ( ) service needs to be enabled on the server.

A.DHCP B.FTP C.DNS D.Remote desktop

37.38. FTP service can enable anonymous login function, its user name is ( ), if you want to upload files, you should use ( ) command.

A. root    B. user    C. guest    D. anonymous

A. copy    B. paste   C. put      D. get

39. The mail client uses the ( ) protocol to synchronize the mailing list between the server and the client.

A. POP3    B. SMTP    C. IMAP    D. SSL

40. On the Windows platform, the function of the command: arp-d * is ().

A. Turn on the ARP learning function B. Add an ARP record C. Display the current ARP record D. Delete all ARP records

41.42. A network topology is shown in the figure below. The management address of the border firewall is 10.0.122.1, and the address of the financial server is 10.0.123.2. In order to prohibit external users from accessing the financial server, the administrator should configure ( ) policies on the border firewall. The source address of this policy configuration should be ( )

A. Address Translation B. Access Control C. Intrusion Prevention D. VPN

A.0.0.0.0       B.10.0.122.1    C.10.0.123.2    D.10.0.123.2

43~45. In the PKI system, SSL/TSL is used to implement HTTPS applications. The method used to encrypt HTTP messages between the browser and the server is ( ). If the server's certificate is revoked, the consequences are ( ). If the browser continues to communicate with the server at this time, the security risk is ( ).

A. The other party’s public key + public key encryption B. The local party’s public key + public key encryption  

C. Session key + public key encryption D. Session key + symmetric encryption

A. The server cannot perform encryption and decryption B. The server cannot perform signature

C. The client can no longer trust the server D. The client cannot send encrypted messages to the server

A. Messages sent by the browser may be lost B. Encrypted messages may be decrypted by a third party

C. Encrypted messages may be tampered with D. Client identity may be compromised

46. ​​Among the various functions of SNMP, what belongs to the network control function is ().

A. Performance management B. Billing management C. Configuration management D. Fault management

47. In the following statement about ICMP, the wrong one is ().

A. ICMP is encapsulated in the data part of the IP datagram B. The transmission of ICMP messages is reliable

C.ICMP is a necessary part of the IP protocol D.ICMP can be used for error control

48. A host cannot access the Internet. After checking the local connection, it is found that there are only sending packets but not receiving packets. The cause of the failure may be ( ).

A. The network cable is not plugged in properly B. DNS configuration error C. IP address configuration error D. TCP/IP protocol failure

49. The transport layer protocol of SNMP is ().

A. UDP    B. TCP    C. IP    D. ICMP

50. The message type of SNMP does not contain ().

A.Get-Request    B.Get-Next-Request    C.Get-Response    D.Get-Next-Response

51. Which of the following IP addresses cannot be forwarded by the router is ().

A.192.169.102.78    B.101.10.10.251     C.127.16.23.1     D.172.33.22.16

52.53. The subnet mask of the IPv4 address 192.168.10.201/26 is ( ), and its network number is ( ).

A.255.255.255.0    B.255.255.255.128    C.255.255.192.0    D.255.255.255.192

A.192.168.10.0     B.192.168.10.64     C.192.168.10.192    D.192.168.10.128

54. The router receives a data packet with a destination address of 201.46.17.4, and should send the data packet to the ( ) subnet.

A.201.46.0.0/21    B.201.46.16.0/20    C.201.46.8.0/22    D.201.46.20.0/22

55. After 2 consecutive Class C addresses are aggregated, the longest subnet mask is ( ) bits.

A.24    B.23    C.22    D.21

56. Among the following statements about the command user-interface vty 0, the correct one is ().

A. Configure the user level as the configuration level B. Not allowed to connect to the virtual terminal

C. Enter the remote login user interface of the switch D. No password is required to connect to the switch

57. Executing a certain command on the switch shows the result as follows, the function of this command is ( ).

A. Check whether the resource file is correct B. Perform CRC check on the resource file

C. Activate the license file in the device memory D. The system rolls back to the previous normal startup version state

58. In the execution result of the following command, the field of Routing Tables describing the routing mark is ( ).

A.Proto     B.Pre    C.Cost     D.Flags

59. In the following narration about VLAN identification, the wrong one is ().

A.VLAN 1D is represented by 12bit  

B. The extended range of VLAN 1D is 1025-4096

C.VLAN 1D The VLAN IDs available for Ethernet are 1-1005 within the scope of the standard

D. VLAN name is represented by 32 characters, which can be letters and numbers.

60. IEEE802.1Q stipulates that in the Tag field of VLAN, the priority used to define the frame is ( ).

A.PRI     B.CFI     C.TPID    D.VID

61. The ( ) command can isolate the two-layer traffic through VLAN to realize the control of network resources.

A.management-vlan    B.voice-vlan    C.mux-vlan     D.aggregate-vlan

62. After executing the following command on the switch SWA, the output is as follows:

 [SWA]display stp

-----[CIST Global lnfo][Mode MSTPJ------

CIST Bridge:32768.000f-e23e-f9b0

Bridge Times:Hello 2s MaxAge 20s FwDly 15s MaxHop20

It can be judged from the output result ( ).

A.SWA's bridge D is 32768 B.SWA is the root bridge   

C.SWA works in RSTP mode D.SWA works in MSTP mode

63. In 5G technology, the technology used to increase the number of access users is ( ).

A.MIMO     B.NGV    C.SOMA    D.SDN

64. In 100BaseT Ethernet, if the contention time slice is 25.6μs, and a station has three consecutive collisions when sending frames, then based on the binary exponential backoff algorithm, the shortest and longest times the station needs to wait are ( ).

A.0μs和179.2μs B.0μs和819.2μs C.25.6μs和179.2μs D.25.6μs和819.2μs

65. Among the following statements about the difference between 2.4G and 5G wireless networks, the wrong one is ( ).

A. There is interference between 2.4G adjacent channels, and there is almost no interference between 5G adjacent channels

B. 5G is faster than 2.4G

C. 5G has less attenuation than 2.4G when passing through obstacles

D.5G has a larger working frequency range than 2.4G

66. A company has 20 offices, all of which are located on the same floor of the office building. It is planned to set up a wireless network in the office area to provide wireless network access for mobile work terminals. It is required to seamlessly roam in each office after connecting to the network once. , the following networking scheme is the most reasonable ( ).

A. Each office deploys Internet access wireless routers for terminal access

B. Each office deploys a thin AP for terminal access, and connects to the Internet access router through a switch

C. Fat APs are deployed in each office for terminal access, and are connected to the Internet access router through a switch

D. Thin APs are deployed in each office for terminal access, and are connected to AC and Internet access routers through switches

67. FC-SAN storage is often connected to the server through optical fibers ().

A. Optical network card B. USB interface C. Fiber channel card D. RAID controller

68. Among the following statements about the structured cabling system, the error is ( ).

A. The work area subsystem is the on-duty place of the network management personnel and needs to be equipped with an uninterruptible power supply

B. The main line subsystem realizes the interconnection between the distribution room of each floor and the equipment of the building

C. The subsystem of the equipment room is composed of building entry lines, switching equipment and other facilities

D. The subsystem of the building group realizes the interconnection between the equipment of each building

69. Among the following statements about the design of the core layer of the three-layer model, the wrong one is ( ).

A. The core layer is the high-speed backbone of the entire network and should have redundant design

B. The core layer should have packet filtering and policy routing design to improve network security protection

C. There should not be too many devices connected to the core layer

D. When access to the Internet is required, the core layer should include one or more connections to external networks

70. The requirements of the third level of computer grade protection for information system user identification are: on the basis of the second level requirements, ( ).

A. Login password complexity requirements should be set and changed regularly

B. Should have a login failure processing function

C. Measures should be taken to prevent the authentication information from being intercepted during transmission

D. Two-factor login authentication should be adopted, and one of the authentication technologies should at least use password technology

71~75.An Intrusion (   ) System (IDS) is a system that monitons network traffic for suspicious activity and alerts when such activity is discovered While (  ) detection and reporting are the primary funcitons of an IDS,some IDSs are also capable of taking actions when (  ) activity or anomalous traffic is detected, including (  ) traffic sent from suspicious Internet Protocol(IP)addresses, Any malicious venture or violation is normally reported either to anadministretor or collected centrally using a (  ) information and event management(SIEM)system.A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious actvity from false alarms.

71.A.Detection    B.Defending   C.Definition   D.Descripiton

72.A.connection   B.anomaly     C.action      D.error

73.A.normal       B.frequent     C.malicious   D.known

74.A.receiving     B.blocking     C.replying     D.storing

75.A.status        B.service      C.security     D.section

Analysis of real questions and answers in the morning for network engineers in the first half of 2023

1.B  Click this link to view the real test analysis video https://ke.qq.com/course/261353

 

    

  

 

70.D

71~75.ABCDC

Supongo que te gusta

Origin blog.csdn.net/xiaornshuo/article/details/132320713
Recomendado
Clasificación