First, multiple-choice questions (65438+ 0 points for each small question, ***60 points)
Of the following four options a), b), c) and d), only one option is correct. Please draw the correct option.
In the corresponding position on the answer sheet, don't grade the test paper.
(1) We often say that "the network is the computer". Do you know which company once put forward this idea?
A) IBM B) Hewlett-Packard Company
C) Sun Company D) Hewlett-Packard Company
(2) An instruction is expressed in hexadecimal as CD2 1 and in binary as.
a) 1 10 1 10000 10000 1 B) 1 100 1 1 10 100 1000 l
c) 1 100 10 1000 100 10D) 1 10 1 1 1 10000 10
(3) the reliability of the system is usually expressed by the mean time between failures, abbreviated as
A) MTBF B) MTTR
ETBF ETTR
(4) Through the cooperation of multiple computers, a complex and big problem can be solved together. In the Pentium chip, support this technology is
A) superscalar technology b) superfluid technology
C) multithreading technology d) multiprocessing technology
(5) PnP motherboard mainly supports
A) multiple chipsets b) mass storage
C) plug and play d) broadband data bus
(6) In the software life cycle, which of the following statements is inaccurate?
A) The software life cycle is divided into three stages: planning, development and operation.
B) In the planning stage, analyze the problems and requirements.
C) Code writing and software testing should be carried out in the later stage of development.
D) Software maintenance is mainly carried out in the running stage.
(7) The network operating system requires network users not to know the network when using it.
First, topology two. Network Protocol III .. Hardware Structure
A) only I and II B) only II and III C) only I and III D) all.
(The address length of IPv6 is
A) bit 32 b) bit 64 c)1bit 28 d) bit 256
(9) The goal of MAN design is to meet a large number of enterprises, institutions and schools in the city.
A) LAN interconnection b) LAN and WAN interconnection
Wide area network interconnection
The main features of (10) optical fiber as a transmission medium are as follows.
First, good confidentiality. High bandwidth III. lowest bit error rate. Complex topology.
A) one, two and four b) one, two and three
D) third and fourth
(1 1) People define the network hierarchy model and protocols at all levels as networks.
A) topology b) open system interconnection model
C) architecture d) protocol set
(12) Which of the following statements is wrong about network architecture?
A) the physical layer completes the transmission of bit stream
B) The data link layer is used to ensure the correct transmission of end-to-end data.
C) The network layer selects an appropriate transmission path for the packet to pass through the communication subnet.
D) The application layer is located at the highest level of the reference model.
(13) Which of the following statements is wrong about the function of the TCP/IP reference model transport layer?
A) The transport layer can provide reliable data transmission services for the application process.
B) The transport layer can provide transparent data transmission services for the application process.
C) The transport layer can provide data format conversion services for the application process.
D) The transport layer can shield the details of low-level data communication.
(14) In the Internet, the address resolution protocol ARP is used for resolution.
A) the correspondence between a)IP address and MAC address
Correspondence between MAC address and port number
C) the correspondence between c)IP address and port number.
D) correspondence between port number and host name
(15) How long does it take to send L-bit data by Ethernet with a rate of 10 Gbps?
A) l× 10-6 seconds B) 1× 10-9 seconds
C) l× 10- 10 second D) 1× 10- 12 second.
(16) Which of the following statements about bit error rate is wrong?
A) The bit error rate refers to the probability that binary symbols are wrongly transmitted in the data transmission system.
B) The bit error rate of the data transmission system must be 0.
C) After the data transmission rate is determined, the lower the bit error rate, the more complicated the transmission system equipment.
D) If the transmitted symbol is not binary, it should be converted into binary symbol for calculation.
(17) Which of the following is not a factor that determines the characteristics of a local area network?
A) transmission medium b) network topology
C) media access control method d) network application
18) in the bus local area network, because the bus is shared by many nodes as a common transmission medium, the problems to be solved in the work process are as follows
A) congestion b) collision
C) exchange d) interconnection
(19) Which of the following descriptions about the characteristics of token bus LAN is wrong?
A) Token is a frame with a special structure, which is used to control the access rights of nodes to the bus.
B) Token bus must provide opportunities for new nodes to join the ring regularly.
C) Token bus does not need ring maintenance.
D) Token bus can provide priority service.
(20) Which of the descriptions about * * * enjoying the Internet is wrong?
A) *** It is more complicated to enjoy the networking equipment of Ethemet.
B) *** Enjoy. Ethernet coverage is limited.
C) *** Pleasant Ethernet cannot support multi-rate devices.
D) *** Pleasant Ethernet is not suitable for applications requiring high real-time transmission.
(2 1) How does the virtual local area network realize the division and management of logical working groups?
A) address table a) software
C) routing table d) hardware
(22)gjbagibit Ethemet defines a new one to ensure that the MAC sublayer will not be affected when the transmission rate is increased to 1000Mbps.
A) Gigabit Media Dedicated Interface B) Gigabit Single Mode Optical Fiber Interface
C) Gigabit logical link sublayer interface D) Gigabit multimode optical fiber interface
(23)IEEE 802. 1 1 uses the following transmission technologies.
A) infrared, frequency hopping spread spectrum and bluetooth
B) Frequency hopping spread spectrum, direct sequence spread spectrum and Bluetooth
C) infrared, direct sequence spread spectrum and bluetooth
D) Infrared: frequency hopping spread spectrum and direct sequence spread spectrum.
(24) When dividing a VLAN, which of the following methods cannot be used to define its members?
A) switch port B) MAC address
C) operating system type D) IP address
(25) Which of the following configuration rules about building multi-hub 10Mbps Ethernet is wrong?
A) Category 3 unshielded twisted pair can be used.
B) The length of each unshielded twisted pair shall not exceed100m.
C) Multiple hubs can be stacked.
D) When will the loop appear in the network?
(26) Which of the following statements is false about the operating system?
A) Device I/O drives external devices through drivers.
B) Memory space occupied by file I/O management applications.
C) In protected mode, when the actual memory is not enough, virtual memory can be generated for use.
D) In a multitasking environment, CPU time should be allocated to each active application in turn.
(27) Which of the following statements is wrong about the network operating system?
A) provide firewall services
B) Shielding the differences between local resources and network resources.
C) Manage the resources of the network system.
D) Provide users with basic network service functions.
(28) For Windows 2000 Server, which of the following statements is false?
A) Domain is its basic management unit.
B) Active directory service is one of its most important functions.
C) Domain controllers are divided into primary domain controllers and standby domain controllers.
D) It does not distinguish between global groups and local groups.
(29) For Linux, which of the following statements is false?
A) Linux is a Unix-like operating system, which can be used and distributed for free.
B) Linux provides a powerful application development environment and supports multiple programming languages.
C) Linux provides comprehensive support for TCP/IP protocol.
D) Linux kernel does not support IP QoS control.
(30) For HP UX Company, which of the following statements is false?
A) HP-UX is a high-performance Unix operating system of IBM.
B) Most HP high-performance workstations are pre-installed with HP UX.
C) HP UX conforms to POSIX standard.
D) The excellent functions of HP UX make it widely used in the financial field.
(3 1) Which of the following statements is false about Solaris?
A) Solaris is a high-performance Unix of SUN Company.
B) Solaris runs on many RISC workstations and servers.
C) Solaris supports multiprocessing and multithreading.
D) Solaris does not support Intel platforms.
(32) Which of the following statements is wrong about the Internet?
A) The Internet is a wide area network.
B) The Internet contains a large number of routing devices.
C) The Internet is an information resource network.
D) Internet users don't need to care about the internal structure of the Internet.
(33) In the Internet, the carriers of information resources and services are
A) hub b) switch
C) router d) host
(34) Which of the following statements is wrong about IP protocol?
A) IP protocol is an Internet protocol.
B) IP protocol defines the specific format of IP datagram.
C) IP protocol requires that the lower layer must use the same physical network.
D) IP protocol provides services for the transport layer.
(35) If you use the 3-digit host number part of a Class C IP address to subnet, then the subnet mask should be
a)255 . 255 . 255 . 192 B)255 . 255 . 255 . 224
c)255 . 255 . 255 . 240D)255 . 255 . 255 . 248
(36) In an IP datagram, if the value of the header length field is 5, how many octets is the header length?
A) 5 B) 10 C) 15 D) 20
(37) Which of the following statements is wrong about hosts and routers in the Internet?
A) the host usually needs to implement TCP/IP protocol.
B) the host usually needs to implement the IP protocol.
C) the router must implement the TCP protocol.
D) the router must implement the IP protocol.
(38) In the Internet, the software requesting domain name resolution must know.
A) IP address of the root domain name server
B) the IP address of any domain name server.
C) the domain name of the root domain name server
D) The domain name of any domain name server.
(39) In Telnet, the main purpose of introducing NVT is
A) shielding the difference of keyboard input of different computer systems
B) improve the speed of users using Telnet.
C) Avoid entering multiple usernames and passwords.
D) Add file download function for Telnet.
(40) The main purpose of Internet users to use FTP is
A) send and receive instant messages b) send and receive emails.
C) Upload and download files d) Obtain the digital certificate of the host.
(4 1) Which of the following statements is wrong about the WWW service system?
A) WWW service adopts server/client working mode.
B) Web pages are written in HTTP.
C) Client applications are often called browsers.
D) page-to-page link information is maintained by URL.
(42) Internet users need to use a modem when using the telephone network to access an ISP. Its main functions are
A) performing conversion between digital signals and analog signals
B) simultaneously transmitting digital signals and voice signals.
C) amplify the digital signal and relay the analog signal.
D) amplifying analog signals and forwarding digital signals.
(43) In the Internet, the widely adopted network management mode is,
A) browser/server b) client/server
C) management center/agent d) server/firewall
(44) Windows NT operating system can achieve the highest security level is
A) C 1 B) C2
D) D2
(45) Which of the following encryption algorithms does not belong to symmetric encryption?
idea
C) TDEA D) RSA
(46) User Zhang San sends a command to delete the file "Zhang San" to the file server. doc”。 The main problems to be determined by the authentication mechanism on the file server are
A) Does Zhang San have the right to delete files b) What encryption technology does Zhang San use?
C) Is this order issued by Zhang Sanfa? D) Is there a virus in Zhang Sanfa's data?
(47) In order to determine whether information has been tampered with by others during network transmission, the commonly used technologies are
A) firewall technology b) database technology
C) message authentication technology d) file exchange technology
(48) When KDC distributes keys, the hosts of both communication parties need to apply for session keys from KDC. When the host communicates with KDC, it uses the.
A) session key b) public key
C) Permanent key shared by both parties * * * D) Temporary key.
(49) Zhang San gets Li Si's digital certificate from CA, and Zhang San can get Li Si's from this digital certificate.
A) private key b) digital signature c) password d) public key
(50) In message authentication, a secure one-way hash function is usually used to generate a message digest. Which of the following characteristics is not required for a secure one-way hash function?
A) the same input produces the same output
B) providing randomness or pseudo randomness
C) easy to implement
D) The input message can be determined according to the output.
(5 1) Which of the following descriptions about firewall technology is wrong?
A) The firewall can control the type of network service.
B) Firewalls can control users who request services.
C) Firewalls can track network attacks.
D) Firewalls can control how users use specific services.
# From www.zhenti.org#
(52) Kerberos is a network authentication protocol, and its encryption algorithm is
A)RSA B) PGP C) DES D) MD5
(53) Which of the following statements is wrong about e-commerce?
A) E-commerce is based on an open Internet environment.
B) E-commerce is mainly based on browser/server mode.
C) The two basic forms of e-commerce are B to B and B to C.
D) E-commerce activities all involve the payment and transfer of funds.
(54) Which of the following statements is wrong about the SET protocol?
A) SET aims to ensure the payment security of online electronic cash.
B) Set the security of information transmission on the Internet.
C) Settings can isolate order information and personal account information.
D) SET requires the software to follow the same protocol and message format.
(55) Which of the following is not a necessary part of establishing an e-government information security infrastructure?
A) security system b) authorization management infrastructure
C) billing system d) public key infrastructure
(56) In the development of e-government, the main features of data processing stage are as follows
A) Establish a "virtual government" to promote collaborative work and information sharing among government departments.
B) Establish an office automation system and an information management system within the government.
C) Using knowledge management technology to improve the decision-making ability of the government in South China.
D) Providing cross-departmental government business services through the "one-stop government" service center.
(57) Which of the following statements is correct about payment software in e-commerce system?
A) The payment software of both the server and the client is called e-wallet.
B) Both the payment software of the server and the client are called electronic teller machines.
C) The payment software on the server side is called electronic wallet, and the payment software on the client side is called electronic teller machine.
D) The payment software on the server side is called an electronic teller machine, and the payment software on the client side is called an electronic wallet.
(58) Which of the following statements about xDSL technology is wrong?
A) xDSL adopts digital subscriber line B) xDSL can provide bandwidth above 128kbps.
C) The uplink and downlink transmission of XDSL must be symmetrical; d C) xDSL access requires the use of a modem.
(59) ATM technology performs CRC check on the transmitted cells. This check is for
A) cell b) cell header only c) payload only d) channel identification only
(60) The media access control mode adopted by IEEE 802.1lb is
A) CSMA/CD B) TD-SCDMA
D)CSMA/ Canada
II. Fill in the blanks (2 points for each blank, ***40 points)
Please write your answers on the horizontal lines numbered 1 to l20 on the answer sheet, and the answers will not be scored on the test paper. (0 1) workstations usually have strong graphics processing capabilities and support 1 graphics ports.
# From www.zhenti.org#
(02) A special committee of American IEEE once divided computers into six categories: mainframes, minicomputers, 2 workstations, supercomputers and minicomputers.
(03) According to the OSI reference model, every node in the network has the same layer, and the peer layers of different nodes use the same layer.
3.
(04) UDP is a 4-oriented unreliable transport layer protocol.
(05) The MAC address of Ethernet is five digits long.
(06) Unlike the * * * media sharing LAN, the switched LAN can increase the bandwidth of the LAN through six connections between switch ports.
(07) There are three main frame forwarding methods for Ethernet switches, namely direct switching, improved direct switching and 7-switch.
(08) 100BASE-T network cards mainly include: 8, 100BASE-FX, 100BASE-T4, 100BASE-T2.
(09) Novell's once sensational network operating system is version 9.6.5, which is still in use today.
(10) Unix system structure consists of two parts: one is the kernel and the other is 10.
(1 1) IP has two broadcast address forms, namely 1 1 broadcast address and limited broadcast address.
(12) The following table shows the routing table of the router. If the router receives an IP datagram with a source IP address of 10.0. 10 and a destination IP address of 40.0.0.40, it will send the IP datagram to 12.
The next router of the network to be reached.
Direct delivery
Direct delivery
10.0.0.0 20.0.0.5
40.0.0.0 30.0.0.7
(13) The protocol used by e-mail applications to send mail to the mail server is 13.
(14) The general steps of network fault management include: finding faults, judging faults, 14 faults, repairing faults and recording faults.
(15) In the Internet, the transport layer protocol used by SNMP is 15.
(16) When information flows from the source to the destination, it may be attacked. Among them, the interrupt attack is an attack on network 16, which destroys system resources.
Page 8 of Level 3 Examination Paper of Network Technology (* * * Page 9)
The encryption algorithm of (17) Elgamal public key system is uncertain, and its ciphertext depends not only on the plaintext to be encrypted, but also on 17 selected by the user.
(18) There are three main ways of electronic payment: electronic cash, electronic check and electronic 18.
(19) The implementation process of one-stop e-government application system can be divided into three stages, namely 19, service request and service scheduling and processing.
(20) SDH self-healing ring technology requires network equipment to have the ability to find a substitute and re-establish communication.
Reference answer
Multiple choice questions: 01-05: cbadc06-10: bdcab15: cbcac16-20: bdbca21-25: badca26. DCAAC 4 1-45:BAC BD 46-50:CCCDD 5 1-55:CCDAC 56-60:BAC BD
Fill in the blanks 0 1) acceleration (or AGP acceleration) 02) personal computer 03) protocol 04) connectionless 05) 48 06) concurrent 07) store and forward 08)100base-tx 09) NetWare10) extra-core program/kloc-0. 30.0.0.713) SMTP14) Isolation 15) UDP 16) Availability 17) Random parameters 18) Credit card 19) Authentication 20).
For other questions, please refer to the following website: http://www.zhenti.org/jsj/.
Self-inspection report model article 1
According to the notification spirit requirements in document 19991February 1 1. * * Issu