network technology
(Examination time 120 minutes, full mark 100)
First, multiple-choice questions (65438+ 0 points for each small question, ***60 points)
Only one of the following four options (a), (b), (c) and (d) is correct. Please mark the correct options in the corresponding position on the answer sheet, and the answers will not be scored on the test paper.
(1) The 2008 Beijing Olympic Games realized a green Olympics, a people's Olympics and a high-tech Olympics. In the following description of the Green Olympics, what is wrong is that
A) It is oriented to sustainable development; b) The Olympic Games aims to create a good ecological environment.
C) Do a good job in energy conservation, emission reduction and air purification d) Information technology is a pollution-free green technology.
(2) When describing the computer model, the mistake is that
A) The server has high security and reliability.
B) The performance of the server is not as good as that of the mainframe, but it is better than that of the minicomputer.
C) The workstation has good graphics processing ability.
D) The display resolution of the workstation is relatively high.
(3) The description of Pentium processor architecture is correct.
A) Superscalar technology is characterized by setting multiple pipelines to execute multiple processes at the same time.
B) The technical feature of super pipeline is branch prediction.
C) Harvard structure is a mixed storage of instructions and data.
D) local bus multiplexing VESA standard
(4) In the description of Itanium processor, it is correct that
A) An Teng is the architecture of LA-64.
B) Used in high-end servers and workstations.
C) CISC, a complex instruction system, is adopted.
D) A concise parallel instruction computation EPIC is implemented.
(5) In the description of the motherboard, it is correct that
A) According to CPU chips, there are SCSI motherboards and EDO motherboards.
B) According to motherboard specifications, there are AT motherboards and ATX motherboards.
C) According to the CPU socket, there are Pentium motherboards and AMD motherboards.
D) According to the data port, there are slot mainboards and socket mainboards.
(6) In the description of software development, the mistake is that
A) The software life cycle includes three stages: planning, development and operation.
B) Conduct demand analysis, overall design and detailed selection at the initial stage of development.
C) coding and testing in the later stage of development
D) Documents are data generated in the process of software operation and use.
(7) In the description of computer network, the mistake is that
A) Computer resources refer to computer hardware, software and data.
B) There is a clear master-slave relationship between computers.
C) Interconnected computers are autonomous computers distributed in different geographical locations.
D) Network users can use local resources and remote resources.
(8) 8) The data transmission rate of 2.5×10bps can be expressed as
a)2.5 kbps B)2.5 Mbps C)2.5 Gbps D)2.5 Gbps
(9) The occurrence of data transmission errors in the network has the following characteristics
A) randomness b) certainty c) exponential property d) progressive property
(10) In the description of the hierarchy division principle of the OSI reference model, it is correct that
A) Different nodes in the same layer have the same function.
B) All nodes in the network need to use the same operating system.
C) Top management needs to know how the underlying functions are realized.
D) The adjacent layers in the same node communicate through the peer-to-peer protocol.
(11) Which layer (or layers) does the TCP/IP reference model correspond to?
A) physical layer b) physical layer and data link layer c) network layer d) network layer and transport layer
(12) In the description of the technical characteristics of MPLS, the mistake is that
A) Fast switching of a)IP packets B) Label switching is the core of B)MPLS.
C) The label is added by the border label switching router d) The label is a forwarding identifier with variable length.
(13) The protocol supporting IP multicast communication is
A)ICMP B)IGMP C)RIP D)OSPF
(14) in the description of the AD hoc network, the mistake is that
A) there is no fixed router b) it needs the support of the base station.
C) Dynamic search capability d) Suitable for emergency rescue and other occasions.
(15) The main tasks of the transport layer are
A) process communication service b) network connection service
C) routing service d) subnet-subnet connection service
(16) Cluster system can be divided into high-availability cluster and high-availability cluster according to application objectives.
A) high performance cluster b) workstation cluster c) homogeneous cluster d) heterogeneous cluster
(17) * * LAN adopting media mode must solve the following problems.
A) network congestion control b) media access control c) network routing control d) physical connection control
(18) Which of the following is the correct Ethernet physical address?
A)00-60-08 B)00-60-08-00-A6-38
c)00-60-08-00D)00-60-08-00-A6-38-00
(19) 10 Gbps Ethernet adopts IEEE.
a)802.3 a B)802.3 ab C)802.3 AE D)802.3 u
(20) An Ethernet switch has 24 full-duplex ports of10/1000Mbps and 2 full-duplex ports of1000 Mbps, which can reach the maximum total bandwidth of the ports.
a)0.44 Gbps B)4.40 Gbps C)0.88 Gbps D)8.80 Gbps
(2 1) In the Ethernet with direct switching mode, those who undertake the task of error detection are
A) node host b) switch c) router d) node host and switch
(22) Virtual local area network can divide network nodes into several according to the nature and needs of work.
A) physical network b) logical working group c) port mapping table d) port number/socket mapping table
(23) Infrared LAN does not adopt the following data transmission technologies.
A) directional beam infrared transmission b) omnidirectional infrared transmission
C) diffuse reflection infrared transmission d) diffraction infrared transmission
(24) Direct sequence spread spectrum communication is to transmit data with pseudo-random codes generated by the transmitter.
A) modular addition 2 b) binary exponent and c) average calculation d) checksum calculation
(25) In the description of the building integrated wiring system, the mistake is that
A) modular structure; B) good scalability.
C) The transmission medium is shielded twisted pair d) It can connect various network devices in the building.
(26) in the description of the window, the mistake is
A) the function to start the process is Create Process B) calling the drawing function through GDI.
C) Various file systems can be used to manage disk files d) Memory management does not require a virtual memory manager.
(27) In the description of the network operating system, it is correct that
A) IBM provided a universal network environment in the early mainframe era.
B) Different network hardware requires different network operating systems.
C) The non-peer structure divides the hard disk space enjoyed by * * into many virtual disks.
D) In the peer-to-peer structure, the software of the server and the client can be interchanged.
(28) In the description of the basic services of Windows 2000 Server, the mistake is that
A) Active Directory stores information about network objects.
B) Active Directory services divide domains into organizational units.
C) Domain controllers do not distinguish between primary domain controllers and backup domain controllers.
D) User groups are divided into global groups and local groups.
(29) In the description of Netware file system, it is correct that
A) Diskless workstations are not supported.
B) Improve the speed of hard disk access through multi-channel hard disk processing and cache technology.
C) No separate file server is required.
D) You can directly enjoy the workstation resources.
(30) In the description of Linux, the mistake is that
A) It is an open source operating system.
B) The source code was first published on the FIP website in Sweden.
C) It provides a good application development environment.
D) Non-Intel hardware platforms can be supported.
(3 1) In the description of Unix, it is correct that
A) It is a multi-user operating system B) It is written in assembly language.
C) Its file system is a mesh structure d) Its standardization is progressing smoothly.
(32) In the description of the Internet, the mistake lies in
A) adopt OSI standard b) as information resource network.
C) running TCP/IP protocol d) being the Internet.
(33) When describing IP datagram delivery, the error lies in
A) The midway router processes each datagram independently.
B) Routers can discard datagrams at will.
C) The midway router alone cannot guarantee that every datagram can be delivered successfully.
D) Datagrams with the same source address and destination address can be delivered through different paths.
(34) A LAN includes four hosts, I, II, III and IV, which are connected to the same hub. The IP addresses, subnet masks and operating systems of these four hosts are as follows:
A)10.1.1.1,255.255.255.0, Windows
B)10.2.1.1,255.255.0, Windows
C) 10. 1. 1.2、255.255.255.0、Unix
D) 10. 1.2 1、255.255.255.0、Linux
If a Web service is provided on host I, then the hosts that can use the Web service are
A) only ⅰ, ⅲ and ⅳB)ⅱC)ⅲD)ⅳ
(35) After the IP datagram is segmented, the device for reassembling the segmented datagram usually
A) Midway Router B) Midway Switch C) Midway Hub D) Destination Host
(36) The routing table of the router is as follows. When it receives a datagram whose destination IP address is 40.0.2.5, it will send the datagram.
The next router of the network to be reached.
Direct delivery
Direct delivery
10.0.0.0 20.0.0.5
40.0.0.0 30.0.0.7
A) delivery to 20.0.0.5 c) direct delivery.
C) Delivery to 30.0.0.7 d) Abandonment.
(37) In the description of the Internet domain name system, the mistake is that
A) Domain name server is required for domain name resolution.
B) Domain name servers form a certain hierarchical structure.
C) There are two ways to resolve domain names: recursive resolution and repeated resolution.
D) Domain name resolution must start from the local domain name server.
(38) In the description of e-mail service, it is correct that
A) users use SNMP protocol to send emails.
B) SMTP protocol is used to exchange mail between mail servers.
C) users use FTP protocol to download emails.
D) users use IMAP protocol to encrypt mail.
(39) the main purpose of using Telnet is
A) log in to the remote host
B) download files
C) introducing a network virtual terminal
D) sending mail
(40) the world's first WWW browser is
A)IE B) navigator c) Firefox d) mosaic
(4 1) In order to prevent the third party from peeking at the sensitive information of the interaction between the WWW browser and the server, it is usually necessary to
A) SSL technology is adopted.
B) loading the digital certificate in the browser
C) adopting digital signature technology
D) Put the server into the trusted site area.
(42) If a user's computer accesses the Internet through a telephone network, the user must have
A) router b) switch c) hub d) modem
(43) In the description of network management function, the mistake is that
A) Configuration management is to master and control the configuration information of the network.
B) Fault management is to locate and completely and automatically eliminate network faults.
C) Performance management is to keep the network performance at a good level.
D) Billing management is to track users' use of network resources.
(44) The following operating systems can reach C2 security level:
ⅰ、System7.x、Windows 98、Windows NT、NetWare4.x
A) one and two b) two and three c) three and four d) two and four
(45) Which of the following is not the principle that network information system security management needs to abide by?
A) principle of multi-person responsibility b) principle of limited tenure c) principle of multi-level and multi-objective management d) principle of separation of duties
(46) Which of the following attacks is a non-service attack?
I mail bomb II source routing attack III address spoofing
A)I and II B) II C)II and III D) I and III.
(47) The security of symmetric encryption technology depends on
A) confidentiality of ciphertext b) confidentiality of decryption algorithm c) confidentiality of key d) confidentiality of encryption algorithm
(48) Which of the following is the most difficult to decipher?
A) Only ciphertext b) Known plaintext c) Select plaintext d) Select ciphertext.
(49) In the description of the characteristics of RSA cryptosystem, the mistake is that
A) The problem based on factorization of large integers b) The public key cryptosystem c) The encryption speed is very fast.
D) Usually used for digital signature and authentication.
(50) Kerberos is a commonly used authentication protocol, and its encryption algorithm is
A) elgar Mal b) DESC) MDD) RSA
(5 1) SHA is a common digest algorithm, and the message digest length it generates is
A) bit A)64 b)1bit 28 c)1bit 60 d) bit D)256.
(52) In the description of condom layering protocol, the mistake is that
A) it can protect the security of the transport layer b) it can provide data encryption service c) it can provide message integrity service d) it can provide data source authentication service.
(53) In the description of digital certificate, it is correct that
A) contains the public key information of the certificate owner b) contains the account information of the certificate owner.
C) contains the public key information of the superior unit of the certificate owner d) contains the private key information of the CA center.
(54) In the description of electronic cash, the mistake is that
A) Anonymity b) Applies to micropayments c) You don't need to contact the bank directly when using d) Depends on the credit information of users.
(55)SET protocol is designed for online transactions of which of the following payment methods?
A) check payment b) payment card c) cash payment d) mobile phone payment
(56) The three levels of e-government logic structure are e-government application layer, unified and secure e-government platform layer and
A) access layer b) convergence layer c) network facilities layer d) payment system layer.
(57) e-government intranet includes public service business network, non-classified government office network and
A) internet b) intranet c) private network d) confidential government office network
(58)HFC network depends on multiplexing technology, and its multiplexing essentially belongs to.
A) time division multiplexing b) frequency division multiplexing c) code division multiplexing d) space division multiplexing.
(59) In the description of ADSL technology, the mistake is that
A) The uplink and downlink transmission rates are different; B) It can transmit data, video and other information; C) An uplink channel of 1Mbps can be provided.
D) 8Mbps downlink channel can be provided at the distance of 10km.
(60)802. 1 1 technology and bluetooth technology can be used together with the frequency of the wireless channel.
A)800 MHz B)2.4 GHz C)5 GHz D) 10 GHz
Second, fill in the blanks (two points for each blank, ***40 points)
Please write each blank correct answer in the horizontal line of the answer sheet serial number 1-20, and the answer will not be scored on the test paper.
(1) system reliability MTBF is the abbreviation of 1.
(2) MPEG compression standards include MPEG video, MPEG 2 and MPEG system.
(3) Multimedia data must keep the 3- constraint relation in time sequence during transmission.
(4) The nodes in the star topology are connected with four nodes through point-to-point communication.
(5) TCP protocol can transmit the stream of the source host 5 to the destination host without error.
(6) Token in token bus LAN is a special 6-frame structure.
(7) CNSN/CD is the sending process: listen before sending, send while listening, stop at 7 o'clock, and resend after random delay.
(8) 10BASE-T uses an Ethernet card with 8 interfaces.
(The unified Unix standard formulated by IEEE is 9.
(10) Red Hat's main product is Red Hat 10 operating system.
(1 1) The Internet is mainly composed of communication lines 1 1, hosts and information resources.
(12) The IP addresses of the hosts are 10.8 and 60.37, and the subnet mask is 255.255.255.0. When the host performs limited broadcasting, the source IP address in the IP data is 12.
(13) With the adoption of 13, WWW browsers and WWW editors developed by different manufacturers can handle WWW pages according to unified standards.
(14) Key distribution technologies mainly include CA technology and 14 technology.
(15) Digital signature is an encrypted message 15, which is used to confirm the identity of the sender and the integrity of the message.
(16) The Website can restrict users from accessing the resources provided by the web server. Access control is generally divided into four levels: hard disk partition permission, user authentication, Web permission and 16 restriction.
(17) In telecom management, the exchange of management information between managers and agents is realized through CMIP and 17.
(18) e-commerce application system includes CA security authentication system, 18 system, business application system and user and terminal system.
(19) The development of e-government includes data processing, information processing and 19 processing.
(20) The main technical features of ATM are: multiplexing, connection-oriented, quality of service and 20 transmission.
September 2008 National Computer Rank Examination Level 3 Written Test Paper Network Technology Reference Answer
First, multiple choice questions
1- 10 DBACB DBDAA
1 1-20 CDBBD ABBCD
2 1-30 ABDAC DCDBB
3 1-40 AABCD CDBAD
4 1-50 ADBCC CCACB
5 1-60 CDADB CDBDB
Second, fill in the blanks
1. mean time between failure
2. acoustic
synchronize
4. Center
5. Bytes
control
7. Conflict
8.RJ-45
9. Portable operating system interface
10.Linux operating system
1 1. router
12. 10.8.60.37
13. Standardized HTML specification
14.KDC
15.
16. Internet address of international computer
17. Public management information service
18. Payment Gateway
knowledge
20.cells