Current location - Quotes Website - Signature design - Answers to the annual examination paper of network engineers
Answers to the annual examination paper of network engineers
Answers to questions of network engineers in the second half of 2007 2008/03/06 08: 17pm. Standard answers to morning questions

( 1)D( 16)B(3 1)B(46)B(6 1)

(2) C ( 17) A (32) C (47) B (62) C

(3) B ( 18) B (33) A (48) C (63) D

(4) C ( 19) D (34) A (49) C (64) C

(5) A (20) C (35) D (50) B (65) D

(6)B(2 1)B(36)B(5 1)A(66)B

(7) B (22) C (37) D (52) C (67) D

(8) B (23) D (38) B (53) C (68) A

(9) D (24) B (39) C (54) C (69) D

( 10) B (25) A (40) D (55) C (70) A

( 1 1)C(26)D(4 1)A(56)D(7 1)B

( 12) D (27) B (42) A (57) A (72) C

( 13) C (28) D (43) D (58) A (73) A

( 14) B (29) C (44) D (59) A (74)

( 15) B (30) C (45) C (60) C (75) B

Afternoon test paper reference answer

Test 1

Question1(1) point a (2): the transmission rate is gigabit and the distance is more than 550 meters.

Question 2(3)A (4)E (5)B (6)VOD server

Question 3 (7)192.168.10.126.

(8)-( 10) There are four combinations, and each combination can be used.

Combination 1:

(8) 192. 168. 1 10. 129- 192. 168. 1 10. 190

(9) 192. 168. 1 10. 193- 192. 168. 1 10.222

( 10) 192. 168. 1 10.225- 192. 168. 1 10.254

Combination 2:

(8) 192. 168. 1 10. 129- 192. 168. 1 10. 190

(9) 192. 168. 1 10.225- 192. 168. 1 10.254

( 10) 192. 168. 1 10. 193- 192. 168. 1 10.222

Combination 3:

(8) 192. 168. 1 10. 193- 192. 168. 1 10.254

(9) 192. 168. 1 10. 129- 192. 168. 1 10. 158

( 10) 192. 168. 1 10. 16 1- 192. 168. 1 10. 190

Combination 4:

(8) 192. 168. 1 10. 193- 192. 168. 1 10.254

(9) 192. 168. 1 10. 16 1- 192. 168. 1 10. 190

( 10) 192. 168. 1 10. 129- 192. 168. 1 10. 158

( 1 1)255.255.255. 128

( 12)255.255.255. 192

( 13)255.255.255.224

( 14)255.255.255.224

Test 2

Question 1( 1)A (2)CNAME

Question 2

The main problems are: it is impossible to distinguish the differences between servers and reflect the current running state (load size) of servers; Or, dynamic scheduling cannot be achieved according to the load situation.

If the server is inaccessible, it will lead to confusion. Some people can access WWW services, while others can't.

Question 3(3) False (or 0) (4) test.com (5)192.168.1.10.

(6) 192. 168. 1.3 (7) 192. 168. 1.0(8)255.255.255.255

Question 4

Host ns serves as NFS (Network File System) server at the same time, and WEB servers (www 1 and www2) serve as its clients, * * * enjoying data and service scripts to ensure data synchronization or consistency of WEB services.

The NFS server needs to distribute data files to www 1 and www2. In order to avoid occupying the bandwidth of Web services for distribution and synchronization, the switch on the left side forms a 192. 168.2.0 NFS private LAN to ensure the quality of Web services.

At the same time, this configuration will make the NFS file system unavailable to the outside world and enhance the security of the server.

Test 3

Question1(1) c 2 b

Question 2(3)B(4)D

Question 3(5)A

Question 4(6)A(7)B

Question 5(8)C

Question 6(9) Access denied (10) 200.115.12.0 ~ 200.438+05438+05.6438+027.

Test 4

Question 1( 1)ARP (or) Address Resolution Protocol

Question 2(2)C (3)A (4)B

Question 3(5)B (6)A (7)D

Question 4 (8) D (9) B (10) A (11) C.

Test five

Question 1

(1) 61.246.100.96 (or 61.124.100.96)

(2) 61.246.100.103 (or 61.124.100.438+003).

(3)5

Question 2(4) The router prohibits HTTP service (5) Configure the router to read and write community strings as admin.

(6) Set ACL to allow192.168.5.1to access CON 0.

Question 3 (7) 255.255.255.248 (8)192.168.50.0 (9) 0.0.0.255

Answers to the examination questions of network engineers in the second half of 2004

The answer to the morning question

( 1)C(2)B(3)C(4)D(5)D(6)C(7)D(8)D(9)B( 10)A( 1 1)C( 12)A( 13)B( 14)C( 15)B( 16)C(6)

19)B 20)D

(2 1)D(22)B(23)B(24)A(25)C(26)B(27)C(28)A(29)

(3 1)D(32)A(33)A(34)A(35)A(36)B(37)D(38)A(39)B(40)B

(4 1)D(42)A(43)A(44)D(45)A(46)C(47)A(48)B(49)C(50)B(52)B(53)B(54)B(55)C(56)B(57)A

(58)C(59)B(60)D(6 1)B(62)D(63)C(64)A(65)D(66)C(67)A(68)D(69)D(70)B(7 1)C(72)A(73)B(74)C

(75) Answer

The answer to the afternoon question

Test 1:

Question 1:

802. 1 1b works at 2.4G—2.483G and the speed is11m.

IEEE802. 1 1a works at 54Mbps in 5GHz band.

802. 1 1g not only adapts to the traditional 802. 1 1b standard, but also provides the transmission rate of1/Mbps at the frequency of 2.45GHz: it also conforms to 802.1/kloc.

802. 1 1G not only realizes the data transmission speed of 802.1A54 Mbps in the 2.4GHz band, but also ensures the compatibility with 802. 1 1B products.

Question 2:

The device names of 1 and (1) are AP.

2.IP address assignment can be static or dynamic. In dynamic allocation, wireless hub is required to have DHCP server function.

3. The encryption value is the same as that set by the wireless hub. When encryption of the wireless hub is now disabled, the value of the "Encryption" item on the network card can be set to "None".

4. use the ping command.

Question 3:

When a user visits the AP, the AP submits the user information to the RADIUS server using the Access-Require data packet, including the user name, password and other related information, in which the user password is encrypted by MD5, and the two parties use the * * * shared key, which is not transmitted through the network.

The RADIUS server checks the legality of the user name and password, and if necessary, it can challenge to further authenticate the user, or it can similarly authenticate the AP. If it is legal, an access acceptance packet is returned to the AP, allowing.

The user enters the next step, otherwise, an access rejection packet is returned, and the user is denied access;

If access is allowed, AP puts forward accounting request Account-Require to RADIUS server, and RADIUS server responds with Account-Accept, so users can start charging and do their own related work.

Test 2:

Question 1:

(1) ADSL modem (2) filter or POTS separator.

Question 2:

Static (fixed) and dynamic IP acquisition

Question 3:

charge

Question 4:

Frequency division multiplexing

Question 5:

The low end of downlink frequency band overlaps with uplink frequency band, and echo cancellation technology.

Question 6:

G.lite: downlink 1.5mb/s needs 24×1000× 8/512kb/s.

Test 3:

Question 1:

In Figure 3- 1, the default maximum mailbox size is set to 10M.

Question 2:

Set the maximum number of users to 2000.

Question 3:

Set the maximum size of a single message to 5M.

Question 4:

Set the default maximum number of messages to 20.

Question 5:

Select Disable Account Access in Figure 3-2.

Question 6:

Set the root user account like user 1 in Figure 3-2.

Question 7:

Set the forwarding address in the forwarding in Figure 3-2.

Test 4:

Question 1:

The port of switch 6 is 10M port, which can be upgraded to 100M port.

Question 2:

1: (1) IP routing table (2)ARP table

2. Modify the router MAC address in the ARP table.

Question 3:

The dynamic translation of 1 is to convert internal IP into externally available IP. In disguise, the internal IP is mapped to the same external IP, and different internal IPS are distinguished through different ports.

2:( 1)65533 (2)202. 1 17. 1 12. 1 15:80(202. 1 17. 1 12. 1 / kloc-0/5) (3) 192. 168. 12. 16 1 (4) 65534 (5) 53. 12. 198. 15

Test 5:

Question 1:

1 (1)LAC (L2TP access connector) (2) LNS (L2TP network server)

2 LAC provides access and L2TP protocol processing, and LNS runs server-side software.

Question 2:

(1) Start VPN

(2) Create a VPDN group 1

(3) Receiving the request of remote user sp_lac, and creating virtual access according to virtual-template 1

(4) Set the local end of the channel as Bob.

(5)LCP negotiates again

(6) Set not to verify channel equivalence.

CSAI gave the wrong number.

There are many mistakes in the above reference answers, and the following are corrections.

Morning test questions

(5) the correct answer should be B.

SISD: This is the easiest way. The computer processes one instruction at a time and assigns data to only one component. It is generally believed that pipelined computers still belong to SISD.

SIMD: It is usually a parallel processor with SIMD points. The processor has multiple processing units and executes the same instruction every time to process different data units. This kind of computer is very suitable for matrix calculation.

MISD: It's hard to imagine this processing method. Multiple processing units execute different instructions at the same time, aiming at a single data. However, it is believed that each data in the pipeline processor is processed by a different component.

MIMD: This is a comprehensive parallel processor, and the typical model is multiprocessor. The design and control of this kind of computer is very complicated.

(8) The correct answer should be B.

Because the cache is divided into 64 blocks, the main memory is divided into 4096/64=64 regions, and the region code length is = =6.

(10) The correct answer should be D.

Tasks of requirements analysis:

Determine the comprehensive requirements of the software: system interface, system function, system performance, security, confidentiality and reliability, system operation requirements, exception handling, future expansion and modification, etc.

Analyze the data requirements of software system: basic data elements, logical relationship between data elements, data volume, peak value, etc.

Derive the logical model of the system.

Revise the project development plan.

(15) The correct answer should be A.

In the optimization stage of CMM, the process can be continuously improved through quantitative analysis of various useful information from processes, new concepts and new technologies.

(18) The correct answer should be B.

In the firewall scheme shown in the figure, there are two firewalls to protect the router from external illegal network attacks and manage the access of all internal networks to DMZ. The fortress host manages DMZ's access to the internal network. Obviously, there is only one DMZ in this diagram, which is a single DMZ firewall structure.

The correct answer should be B.

The correct answer should be D.

Digital certificate adopts public key cryptosystem, that is, a pair of matching keys are used for encryption and decryption. Every user has a private key that only he has, and uses it to decrypt and sign; At the same time, it has a public key, which can be publicly used for encryption and signature verification.

There is no correct answer to this question.

Among the four options given, there is no correct answer that meets the requirements of the test questions.

The correct answer should be B.

The application gateway transforms the semantics of the message.

Afternoon examination questions

There are also many mistakes in the afternoon exam. For example, questions 3 and 6 in Test 2 will get 0 points, and questions 1 in Test 4 will also get 0 points. I won't list them here. Please wait for the correct test analysis and answer in the second half of 2004, which will be published by the National Soft Test Office in early 2005.

And answers.

Citation:/cs/learning/2008-5-26/84201-1.htm

/search? Customer = aff- avalanche & ampforid =1&; Channel = pre-filled & ie = GB&UTF-8&; HL = zh-CN & amp; q = % CD % F8 % C2 % E7 % B9 % A4 % B3 % CC % CA % A6 % CA % D4 % BE % ED % B4 % F0 % B0 % B8 & amp; aq=f